IoT Security & Trust_Quiz 1

IoT Security & Trust_Quiz 1

Professional Development

10 Qs

quiz-placeholder

Similar activities

PROTECTING YOUR DATA  WEEK3

PROTECTING YOUR DATA WEEK3

Professional Development

15 Qs

Network Security Baselines

Network Security Baselines

Professional Development

14 Qs

Python Variables, Data Types, and User Input Quiz

Python Variables, Data Types, and User Input Quiz

Professional Development

10 Qs

APLIKASI TMK

APLIKASI TMK

Professional Development

8 Qs

ATE6123 Fundamental of Wireless Communications - Topic 3

ATE6123 Fundamental of Wireless Communications - Topic 3

Professional Development

10 Qs

DECI - WEEK#7 - Time Machine

DECI - WEEK#7 - Time Machine

Professional Development

15 Qs

Microsoft IT Pro Meetup - July

Microsoft IT Pro Meetup - July

Professional Development

15 Qs

Knowing the Cyber Threat

Knowing the Cyber Threat

Professional Development

6 Qs

IoT Security & Trust_Quiz 1

IoT Security & Trust_Quiz 1

Assessment

Quiz

Information Technology (IT)

Professional Development

Easy

Created by

DR 1142

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

1.What are the two main security attacks in IoT?

Active and Passive attacks

Phishing attacks and SQL injection
Ransomware attacks and Cross-Site Scripting
Credential stuffing and Session hijacking

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

2.Give the meaning for Access control?

Access control is a security measure that regulates who can view or use resources in a computing environment.
Access control is a type of software that enhances graphics performance.
Access control refers to the physical security of a building.
Access control is a method for increasing internet speed.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

3.Discuss the term Steganography?

Steganography is a method of encrypting data to make it unreadable.
Steganography involves the use of complex algorithms to secure data transmission.
Steganography is the process of compressing files to save space.
Steganography is the art of hiding information within other non-secret data.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

4.What is Cryptography?

Cryptography is the art of creating complex algorithms.
Cryptography is the study of ancient languages.
Cryptography is a method of data storage without security.
Cryptography is the science of securing information through encoding.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

5.List out the components of Cryptography.

Data encryption, backup systems, antivirus software, network security
User authentication, data compression, network protocols, firewalls
Hash functions, firewalls, VPNs, malware
Encryption algorithms, keys, protocols, digital signatures

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

6.If same key is used for encryption & decryption the algorithm is called _________

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

7.If different keys are used for encryption & decryption the algorithm is called __________.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?