IoT Security Chapter 4 Quiz

IoT Security Chapter 4 Quiz

12th Grade

25 Qs

quiz-placeholder

Similar activities

SOAL TI POLRI

SOAL TI POLRI

1st - 12th Grade

20 Qs

Ch 8 SCCS Social Memory: That's what this is all about?

Ch 8 SCCS Social Memory: That's what this is all about?

9th - 12th Grade

20 Qs

Socialization Review

Socialization Review

11th - 12th Grade

20 Qs

Cardiovascular System Vocabulary

Cardiovascular System Vocabulary

11th - 12th Grade

20 Qs

Adm Sistem Jaringan XII

Adm Sistem Jaringan XII

12th Grade

20 Qs

Bahasa Inggris

Bahasa Inggris

4th Grade - University

20 Qs

Fish Health

Fish Health

12th Grade

20 Qs

Cinefilos

Cinefilos

KG - Professional Development

20 Qs

IoT Security Chapter 4 Quiz

IoT Security Chapter 4 Quiz

Assessment

Quiz

Other

12th Grade

Practice Problem

Hard

Created by

Im Bored

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why would an engineer only use very short-range radios to allow sensor data to travel from node to node until the data reaches the IoT gateway?

High availability

Power constraints

Channel requirements

Increased bandwidth

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A home owner recently installed an IoT smart plug that was designed to be controlled over the internet. After a couple of days, the home owner notices a new wireless name of Outlet4375 appears when they attempt to connect a smartphone to the house wireless network. Which statement identifies the situation that is occurring?

The home Wi-Fi network name should be changed to match the Outlet4375 wireless network name in order to activate the smart plug

The smart plug was never connected to the home Wi-Fi and is awaiting a connection on the Outlet4375 wireless network

The wireless network name of Outlet4375 is a wireless network used for securely isolating the network traffic of the smart plug

The smart plug will always broadcast the Outlet4375 wireless name for management connections

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which OWASP communication layer vulnerability should be researched when securing the IoT network traffic attack surface?

Unencrypted services

Protocol fuzzing

Replay attack

Injection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor uses non-blind spoofing to launch an attack. What are two objectives for the attack?

Determining the state of a firewall

Overwhelming web servers

Flooding the network with maliciously formatted packets

Depleting the batteries of IP-based IoT devices

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of IoT wireless network would interconnect audio devices and smart watches to a cell phone that serves as an IoT gateway?

Wireless body-area network

Wireless field-area network

Wireless personal-area network

Wireless home-area network

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which type of scenario would an IoT gateway not be required to convert traffic to Wi-Fi or wired ethernet?

When smart objects forward data within a mesh network

When smart objects forward data using TCP/IP protocols

When smart objects forward data within a hub-and-spoke topology

When smart objects forward data within a star topology

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves threat actors positioning themselves between a source and destination with the intent of transparently monitoring, capturing, and controlling the communication?

ICMP attack

Man-in-the-middle attack

DoS attack

SYN flood attack

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?