IoT Security Chapter 4 Quiz

IoT Security Chapter 4 Quiz

12th Grade

25 Qs

quiz-placeholder

Similar activities

Computer Networking

Computer Networking

12th Grade

25 Qs

Networking Cable and Devices

Networking Cable and Devices

9th - 12th Grade

20 Qs

CMN Total Revision

CMN Total Revision

10th Grade - University

20 Qs

Networks & Network Topologies

Networks & Network Topologies

12th Grade

24 Qs

Internet Based Controller

Internet Based Controller

12th Grade

20 Qs

Networking Concepts

Networking Concepts

12th Grade - University

25 Qs

Komputer & Jaringan Dasar

Komputer & Jaringan Dasar

10th - 12th Grade

20 Qs

IoT Security Chapter 4 Quiz

IoT Security Chapter 4 Quiz

Assessment

Quiz

Other

12th Grade

Hard

Created by

Im Bored

Used 5+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why would an engineer only use very short-range radios to allow sensor data to travel from node to node until the data reaches the IoT gateway?

High availability

Power constraints

Channel requirements

Increased bandwidth

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A home owner recently installed an IoT smart plug that was designed to be controlled over the internet. After a couple of days, the home owner notices a new wireless name of Outlet4375 appears when they attempt to connect a smartphone to the house wireless network. Which statement identifies the situation that is occurring?

The home Wi-Fi network name should be changed to match the Outlet4375 wireless network name in order to activate the smart plug

The smart plug was never connected to the home Wi-Fi and is awaiting a connection on the Outlet4375 wireless network

The wireless network name of Outlet4375 is a wireless network used for securely isolating the network traffic of the smart plug

The smart plug will always broadcast the Outlet4375 wireless name for management connections

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which OWASP communication layer vulnerability should be researched when securing the IoT network traffic attack surface?

Unencrypted services

Protocol fuzzing

Replay attack

Injection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor uses non-blind spoofing to launch an attack. What are two objectives for the attack?

Determining the state of a firewall

Overwhelming web servers

Flooding the network with maliciously formatted packets

Depleting the batteries of IP-based IoT devices

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of IoT wireless network would interconnect audio devices and smart watches to a cell phone that serves as an IoT gateway?

Wireless body-area network

Wireless field-area network

Wireless personal-area network

Wireless home-area network

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which type of scenario would an IoT gateway not be required to convert traffic to Wi-Fi or wired ethernet?

When smart objects forward data within a mesh network

When smart objects forward data using TCP/IP protocols

When smart objects forward data within a hub-and-spoke topology

When smart objects forward data within a star topology

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves threat actors positioning themselves between a source and destination with the intent of transparently monitoring, capturing, and controlling the communication?

ICMP attack

Man-in-the-middle attack

DoS attack

SYN flood attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?