IoT Security Chapter 4 Quiz

IoT Security Chapter 4 Quiz

12th Grade

•

25 Qs

quiz-placeholder

Similar activities

AIJ

AIJ

12th Grade

•

20 Qs

Webinar MLC 2021

Webinar MLC 2021

7th - 12th Grade

•

20 Qs

Tech - General Q&A

Tech - General Q&A

8th Grade - Professional Development

•

20 Qs

Front Office- Pretest

Front Office- Pretest

12th Grade

•

20 Qs

PENGENALAN ICT

PENGENALAN ICT

12th Grade

•

20 Qs

Understanding Hydronic Heating Systems

Understanding Hydronic Heating Systems

12th Grade

•

20 Qs

Financial cybercrime and fraud

Financial cybercrime and fraud

9th - 12th Grade

•

20 Qs

Aplikasi Pengolah Kata

Aplikasi Pengolah Kata

12th Grade

•

25 Qs

IoT Security Chapter 4 Quiz

IoT Security Chapter 4 Quiz

Assessment

Quiz

•

Other

•

12th Grade

•

Practice Problem

•

Hard

Created by

Im Bored

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why would an engineer only use very short-range radios to allow sensor data to travel from node to node until the data reaches the IoT gateway?

High availability

Power constraints

Channel requirements

Increased bandwidth

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A home owner recently installed an IoT smart plug that was designed to be controlled over the internet. After a couple of days, the home owner notices a new wireless name of Outlet4375 appears when they attempt to connect a smartphone to the house wireless network. Which statement identifies the situation that is occurring?

The home Wi-Fi network name should be changed to match the Outlet4375 wireless network name in order to activate the smart plug

The smart plug was never connected to the home Wi-Fi and is awaiting a connection on the Outlet4375 wireless network

The wireless network name of Outlet4375 is a wireless network used for securely isolating the network traffic of the smart plug

The smart plug will always broadcast the Outlet4375 wireless name for management connections

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which OWASP communication layer vulnerability should be researched when securing the IoT network traffic attack surface?

Unencrypted services

Protocol fuzzing

Replay attack

Injection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor uses non-blind spoofing to launch an attack. What are two objectives for the attack?

Determining the state of a firewall

Overwhelming web servers

Flooding the network with maliciously formatted packets

Depleting the batteries of IP-based IoT devices

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of IoT wireless network would interconnect audio devices and smart watches to a cell phone that serves as an IoT gateway?

Wireless body-area network

Wireless field-area network

Wireless personal-area network

Wireless home-area network

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which type of scenario would an IoT gateway not be required to convert traffic to Wi-Fi or wired ethernet?

When smart objects forward data within a mesh network

When smart objects forward data using TCP/IP protocols

When smart objects forward data within a hub-and-spoke topology

When smart objects forward data within a star topology

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves threat actors positioning themselves between a source and destination with the intent of transparently monitoring, capturing, and controlling the communication?

ICMP attack

Man-in-the-middle attack

DoS attack

SYN flood attack

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?