IOT SECURITY 1st

IOT SECURITY 1st

12th Grade

21 Qs

quiz-placeholder

Similar activities

security+ (601)

security+ (601)

9th Grade - Professional Development

25 Qs

security+ (601)

security+ (601)

9th Grade - Professional Development

20 Qs

OCR IT. Unit 3 - Cyber Security. LO2 test:

OCR IT. Unit 3 - Cyber Security. LO2 test:

11th - 12th Grade

20 Qs

CIS27B Quiz 1 Review Game

CIS27B Quiz 1 Review Game

12th Grade

24 Qs

Cybersecurity Essentials Chapter 1 Review

Cybersecurity Essentials Chapter 1 Review

10th Grade - University

25 Qs

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

 Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

12 CSC ATAR - Cyber security

12 CSC ATAR - Cyber security

12th Grade

17 Qs

IOT SECURITY 1st

IOT SECURITY 1st

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Jeannette Rojas

Used 20+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What process is used by blockchain technology to validate transactions?

  • scope of work

  • digital signatures

  • synchronous key encryption

  • proof of work

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which programming language is an example of an interpreted language?

  • C#

  • Java

Python

  • C

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which DFD symbol represents data output from sensing, actuating, traffic forwarding, analysis, and control systems?

  • external entity

  • data flow

  • data store

process

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are three items that should be included in the documentation describing the components of the IoT system at each layer? (Choose three.)

applications

devices

communications network

  • protocols

  • technologies

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework by NIST, which work role in the risk management specialty area conducts comprehensive assessments of the management, operational, and technical security controls to determine their overall effectiveness?

  • Security Architect

  • Security Control Assessor

  • Vulnerability Assessment Analyst

  • Secure Software Assessor

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor has used malicious commands to trick the database into returning unauthorized records and other data. Which web front-end vulnerability is the threat actor exploiting?

  • cross-site scripting

  • broken authentication

  • security misconfiguration

SQL injections

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework by NIST, which work role in the Vulnerability Assessment and Management specialty area performs assessments of IT systems and identifies where those systems deviate from acceptable configurations or policy?

Vulnerabiliry Assessment Analyst

  • Secure Software Assessor

  • Security Architect

  • Security Control Assessor

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?