• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

WGU Internet of Things (IoT) and Infrastructure - D337

Latest WGU Jan 17, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

WGU Internet of Things (IoT) and Infrastructure - D337 Leave the first rating Students also studied Terms in this set (60) Western Governors UniversityD 337 Save D337 - Internet of Things (IoT) and I...207 terms kickinwing-Preview D337 - Internet Of Things and Infras...408 terms SpaceChimpanzee Preview D337 - Internet of Things (IoT) and I...207 terms Sb91turnerPreview Telecom 625 term JCJC Which building block is used to move collected IoT data to the central IoT platform?Gateway What is the function of soil moisture sensors in a smart agriculture ecosystem?Capturing soil moisture metrics What moves data from IoT sensor devices to a central network?Gateway Which computation method processes data captured at the sensor device before sending it to a backhaul network?Edge computing Which building block of the IoT architecture is responsible for collecting raw data generated by the monitored entity?Sensor What is the function of the customer edge device in the four-node edge computing model?Provides limited local storage and processing capabilities Which two processor architectures are used by Customer Premises Edge Compute (C-PEC) devices?x86, ARM Which module in the edge computing framework is used to store IoT data received from sensors or from the cloud?Information broker

Which feature characterizes a wireless local area network (WLAN) in an IoT architecture?Support for line-of-sight communication What is the result of switching from the industrial, scientific, and medical (ISM) frequency above 1 GHz to the ISM frequency below 1 GHz?Longer range What is a short-range network technology that supports meshing?Zigbee Which two components provide the connectivity for an IoT architecture? Choose 2 answers.Access network, Gateway A university is testing a smart energy solution and requires a system to monitor the following parameters

of power used by its buildings:

voltage phase apparent power power factor frequency Which device should be used to perform these readings?Power measurement and control (PMC) A university is deploying a smart energy solution to its student dormitories and needs to collect power usage data for billing purposes. Which device should this university use?Smart meter (SM) A city plans for an Intelligent Transport System (ITS) that monitors public transport locations, as well as accidents and congestions, to control traffic lights effectively. Which two items should be used to gather information for the system? Choose 2 answers GPS devices, Smart CCTV cameras An electric utility company needs to increase the speed of the collection and improve the accuracy of the information it manually collects from its meters. The meters are located in the back of residential dwellings.Which solution meets both requirements?Install a sensor on meters that can transmit data to a receiver Which IoT device is used in a smart building to determine when rooms are in use?Smart light Which IoT device can improve emergency responses by monitoring a user’s activities at home?Companion robot Which type of IoT detection sensor built into electric bulbs minimizes energy usage?Motion

A company plans to adopt IoT into its business operations and then go public. The company is concerned about the financial and reputational impact of increasing the volume of personally identifiable information (PII) that might inadvertently be exposed, which would affect the value of its stock. Which two considerations should be addressed as part of the adoption strategy? Choose 2 answers.Privacy, Security Which task does an information consumer perform within an IoT ecosystem?Builds applications that use data from various sources after obtaining consent How does the processing of IoT data in the cloud change when transitioning from the Lambda architecture to Kappa architecture?The batch layer is removed.Which component in the Lambda architecture acts as the streaming layer in a streaming processing system?Real-time engine Which two technology areas affect the networking requirements within the customer IoT landscape?Choose 2 answers.Smart home, Wearables Which vulnerability do IoT botnets target on IoT devices by applying data found on the internet?Default credentials Which two stakeholder groups contribute to addressing the challenges of IoT security? Choose 2 answers.Governments, Standards development bodies Which two issues can result from global deployment of insecurely configured IoT devices? Choose 2 answers.Devices are compromised to provide fake data, Devices are compromised to form botnets Which type of malware creates a network of remotely controlled IoT devices unknown to the owners?Botnet What enables IoT devices to be infected by the Mirai malware?Default passwords A company develops a small tracker to be used in parcels to track progress via Global Positioning System (GPS). Testing reveals that the tracker has a Joint Test Action Group (JTAG) port on the circuit board that can be used to overwrite the firmware on the tracker and provide false location data. Which two Internet of Things Security Foundation (IoTSF) Best Practice Guidelines (BPGs) should this company follow in its design process to ensure security from these forms of attack? Choose 2 answers.Device secure boot, Physical security

A company develops an IoT-based security system. The system uses proximity sensors that communicate with a central gateway using a 433 MHZ radio signal. Testing reveals that the traffic can be sniffed with a software- defined radio, and an attacker could spoof the proximity sensor by copying the authentication details from the radio traffic. Which Internet of Things Security Foundation (IoTSF) Best Practice Guideline (BPG) should this company follow in its design process to ensure the security of the radio data?Network connections A company hosts a database in a public cloud. Multiple IoT devices are compromised and used to generate a high volume of requests targeting the database to affect its availability. Which type of attack is this?Distributed denial of service (DDoS) A company developed an IoT smart photo frame that allows users to upload photos to their device using a web browser. Testing revealed that users can upload files onto the root filesystem. Which Internet of Things Security Foundation (IoTSF) Best Practice Guideline (BPG) should this company follow in its design process to ensure filesystem permissions are set correctly?Secure operating system A company uses IoT devices to capture data in the field and transmit it for central processing. The company plans to follow the Internet of Things Security Foundation’s (IoTSF) Best Practice Guidelines (BPGs) to ensure that personal data is protected. Which IoTSF guideline should this company use?Securing software updates A company is developing a smart speaker. The company wants to review industry standards on device boot and operating system security to improve security in its devices. Which two resources should this company evaluate? Choose 2 answers.Code of Practice, Best Practice Guidelines Malware has infected several IoT devices in a company.These devices were using default configurations.What should the company do to prevent the malware from being installed?Change the devices' usernames and passwords What does blockchain implement to ensure reliable data are returned when there are multiple sensors measuring the same data?Agreed consensus mechanism Which blockchain feature in an IoT application ensures that a transaction is tamperproof once it is validated?Immutability What is the purpose of the consensus mechanism enabled through blockchain when collecting the same signals from multiple IoT sensors?Providing a single version of the truth across all sensor data

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

This document featured step-by-step guides that was a perfect resource for my project. Such an excellent resource!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 17, 2026
Description:

WGU Internet of Things (IoT) and Infrastructure - D337 Leave the first rating Students also studied Terms in this set Western Governors UniversityD 337 Save D337 - Internet of Things (IoT) and I......

Unlock Now
$ 11.00