Search Header Logo

IOT SECURITY 1st

Authored by Jeannette Rojas

Computers

12th Grade

Used 20+ times

IOT SECURITY 1st
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What process is used by blockchain technology to validate transactions?

  • scope of work

  • digital signatures

  • synchronous key encryption

  • proof of work

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which programming language is an example of an interpreted language?

  • C#

  • Java

Python

  • C

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which DFD symbol represents data output from sensing, actuating, traffic forwarding, analysis, and control systems?

  • external entity

  • data flow

  • data store

process

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are three items that should be included in the documentation describing the components of the IoT system at each layer? (Choose three.)

applications

devices

communications network

  • protocols

  • technologies

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework by NIST, which work role in the risk management specialty area conducts comprehensive assessments of the management, operational, and technical security controls to determine their overall effectiveness?

  • Security Architect

  • Security Control Assessor

  • Vulnerability Assessment Analyst

  • Secure Software Assessor

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor has used malicious commands to trick the database into returning unauthorized records and other data. Which web front-end vulnerability is the threat actor exploiting?

  • cross-site scripting

  • broken authentication

  • security misconfiguration

SQL injections

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework by NIST, which work role in the Vulnerability Assessment and Management specialty area performs assessments of IT systems and identifies where those systems deviate from acceptable configurations or policy?

Vulnerabiliry Assessment Analyst

  • Secure Software Assessor

  • Security Architect

  • Security Control Assessor

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?