Search Header Logo

IoT Security Chapter 4 Quiz

Authored by Im Bored

Other

12th Grade

Used 5+ times

IoT Security Chapter 4 Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why would an engineer only use very short-range radios to allow sensor data to travel from node to node until the data reaches the IoT gateway?

High availability

Power constraints

Channel requirements

Increased bandwidth

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A home owner recently installed an IoT smart plug that was designed to be controlled over the internet. After a couple of days, the home owner notices a new wireless name of Outlet4375 appears when they attempt to connect a smartphone to the house wireless network. Which statement identifies the situation that is occurring?

The home Wi-Fi network name should be changed to match the Outlet4375 wireless network name in order to activate the smart plug

The smart plug was never connected to the home Wi-Fi and is awaiting a connection on the Outlet4375 wireless network

The wireless network name of Outlet4375 is a wireless network used for securely isolating the network traffic of the smart plug

The smart plug will always broadcast the Outlet4375 wireless name for management connections

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which OWASP communication layer vulnerability should be researched when securing the IoT network traffic attack surface?

Unencrypted services

Protocol fuzzing

Replay attack

Injection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor uses non-blind spoofing to launch an attack. What are two objectives for the attack?

Determining the state of a firewall

Overwhelming web servers

Flooding the network with maliciously formatted packets

Depleting the batteries of IP-based IoT devices

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of IoT wireless network would interconnect audio devices and smart watches to a cell phone that serves as an IoT gateway?

Wireless body-area network

Wireless field-area network

Wireless personal-area network

Wireless home-area network

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which type of scenario would an IoT gateway not be required to convert traffic to Wi-Fi or wired ethernet?

When smart objects forward data within a mesh network

When smart objects forward data using TCP/IP protocols

When smart objects forward data within a hub-and-spoke topology

When smart objects forward data within a star topology

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves threat actors positioning themselves between a source and destination with the intent of transparently monitoring, capturing, and controlling the communication?

ICMP attack

Man-in-the-middle attack

DoS attack

SYN flood attack

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?