IOT SECURITY 1st

IOT SECURITY 1st

12th Grade

21 Qs

quiz-placeholder

Similar activities

IOT AND CLOUD COMPUTING QUIZ 1

IOT AND CLOUD COMPUTING QUIZ 1

12th Grade - University

20 Qs

Cloud Computing and IoT Basics Quiz

Cloud Computing and IoT Basics Quiz

9th Grade - University

20 Qs

IOT Gr12 Revision

IOT Gr12 Revision

11th - 12th Grade

17 Qs

Chapter 1 Intro to Cybersecurity Cisco

Chapter 1 Intro to Cybersecurity Cisco

10th Grade - University

25 Qs

T Level Digital Security Revision

T Level Digital Security Revision

11th Grade - University

24 Qs

 Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

Practice for 8th AP CSP quiz

Practice for 8th AP CSP quiz

10th - 12th Grade

20 Qs

Security

Security

12th Grade - Professional Development

24 Qs

IOT SECURITY 1st

IOT SECURITY 1st

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Jeannette Rojas

Used 20+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What process is used by blockchain technology to validate transactions?

  • scope of work

  • digital signatures

  • synchronous key encryption

  • proof of work

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which programming language is an example of an interpreted language?

  • C#

  • Java

Python

  • C

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which DFD symbol represents data output from sensing, actuating, traffic forwarding, analysis, and control systems?

  • external entity

  • data flow

  • data store

process

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are three items that should be included in the documentation describing the components of the IoT system at each layer? (Choose three.)

applications

devices

communications network

  • protocols

  • technologies

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework by NIST, which work role in the risk management specialty area conducts comprehensive assessments of the management, operational, and technical security controls to determine their overall effectiveness?

  • Security Architect

  • Security Control Assessor

  • Vulnerability Assessment Analyst

  • Secure Software Assessor

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor has used malicious commands to trick the database into returning unauthorized records and other data. Which web front-end vulnerability is the threat actor exploiting?

  • cross-site scripting

  • broken authentication

  • security misconfiguration

SQL injections

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework by NIST, which work role in the Vulnerability Assessment and Management specialty area performs assessments of IT systems and identifies where those systems deviate from acceptable configurations or policy?

Vulnerabiliry Assessment Analyst

  • Secure Software Assessor

  • Security Architect

  • Security Control Assessor

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?