IoT Security & Trust_Quiz 1

IoT Security & Trust_Quiz 1

Professional Development

10 Qs

quiz-placeholder

Similar activities

Recap Object Detection

Recap Object Detection

Professional Development

8 Qs

Computational Thinking

Computational Thinking

Professional Development

5 Qs

Speed Quiz TCBian Visit

Speed Quiz TCBian Visit

Professional Development

10 Qs

Cynergy_AI (Day 1)

Cynergy_AI (Day 1)

Professional Development

8 Qs

LINKS Cyber Youth Challenge - Round 4

LINKS Cyber Youth Challenge - Round 4

Professional Development

10 Qs

Knowledge Check 2

Knowledge Check 2

Professional Development

10 Qs

Cybersecurity Core Functions

Cybersecurity Core Functions

Professional Development

15 Qs

Recap Machine Learning

Recap Machine Learning

Professional Development

8 Qs

IoT Security & Trust_Quiz 1

IoT Security & Trust_Quiz 1

Assessment

Quiz

Information Technology (IT)

Professional Development

Easy

Created by

DR 1142

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

1.What are the two main security attacks in IoT?

Active and Passive attacks

Phishing attacks and SQL injection
Ransomware attacks and Cross-Site Scripting
Credential stuffing and Session hijacking

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

2.Give the meaning for Access control?

Access control is a security measure that regulates who can view or use resources in a computing environment.
Access control is a type of software that enhances graphics performance.
Access control refers to the physical security of a building.
Access control is a method for increasing internet speed.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

3.Discuss the term Steganography?

Steganography is a method of encrypting data to make it unreadable.
Steganography involves the use of complex algorithms to secure data transmission.
Steganography is the process of compressing files to save space.
Steganography is the art of hiding information within other non-secret data.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

4.What is Cryptography?

Cryptography is the art of creating complex algorithms.
Cryptography is the study of ancient languages.
Cryptography is a method of data storage without security.
Cryptography is the science of securing information through encoding.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

5.List out the components of Cryptography.

Data encryption, backup systems, antivirus software, network security
User authentication, data compression, network protocols, firewalls
Hash functions, firewalls, VPNs, malware
Encryption algorithms, keys, protocols, digital signatures

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

6.If same key is used for encryption & decryption the algorithm is called _________

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

7.If different keys are used for encryption & decryption the algorithm is called __________.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?