Search Header Logo

IoT Security & Trust_Quiz 1

Authored by DR 1142

Information Technology (IT)

Professional Development

Used 1+ times

IoT Security & Trust_Quiz 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

1.What are the two main security attacks in IoT?

Active and Passive attacks

Phishing attacks and SQL injection
Ransomware attacks and Cross-Site Scripting
Credential stuffing and Session hijacking

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

2.Give the meaning for Access control?

Access control is a security measure that regulates who can view or use resources in a computing environment.
Access control is a type of software that enhances graphics performance.
Access control refers to the physical security of a building.
Access control is a method for increasing internet speed.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

3.Discuss the term Steganography?

Steganography is a method of encrypting data to make it unreadable.
Steganography involves the use of complex algorithms to secure data transmission.
Steganography is the process of compressing files to save space.
Steganography is the art of hiding information within other non-secret data.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

4.What is Cryptography?

Cryptography is the art of creating complex algorithms.
Cryptography is the study of ancient languages.
Cryptography is a method of data storage without security.
Cryptography is the science of securing information through encoding.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

5.List out the components of Cryptography.

Data encryption, backup systems, antivirus software, network security
User authentication, data compression, network protocols, firewalls
Hash functions, firewalls, VPNs, malware
Encryption algorithms, keys, protocols, digital signatures

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

6.If same key is used for encryption & decryption the algorithm is called _________

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

7.If different keys are used for encryption & decryption the algorithm is called __________.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?