Security Threats specific to IoT and Mobile Devices (GROUP 1)

Security Threats specific to IoT and Mobile Devices (GROUP 1)

University

15 Qs

quiz-placeholder

Similar activities

Cybeteria Meetup July, 2025

Cybeteria Meetup July, 2025

University

20 Qs

Ethics - Week 5 Revision

Ethics - Week 5 Revision

University

10 Qs

Digital Ethics and AI Awareness

Digital Ethics and AI Awareness

7th Grade - University

20 Qs

FHCT1012 Computing Technology Sample MIdterm questions

FHCT1012 Computing Technology Sample MIdterm questions

University

15 Qs

PW_IoT_quiz_1

PW_IoT_quiz_1

University

12 Qs

TOPIC 4.0  Information Security Governance Principles

TOPIC 4.0 Information Security Governance Principles

University

20 Qs

Cybersecurity

Cybersecurity

University

20 Qs

Security Threats specific to IoT and Mobile Devices (GROUP 1)

Security Threats specific to IoT and Mobile Devices (GROUP 1)

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Mark Feguro

Used 3+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a primary characteristic of a security threat?

A feature that enhances device performance

A routine software update

A potential danger that exploits weaknesses

A method for secure data transfer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does "IoT" stand for?

Internet of Technology

Interconnected operating things

Internal operating technology

Internet of Things

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of an IoT security threat?

Using multi-factor authentication

Botnets like Mirai hijacking devices

Regularly updating firmware

Using strong and unique passwords

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the document, why are mobile devices frequently targeted by attackers?

They have excellent built-in security features.

They are not connected to the internet.

They store banking, personal, and work data.

They receive regular security updates.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "smishing"?

Hacking via public Wi-Fi

A type of malware app

Phishing via SMS

SIM swapping to hijack phone numbers

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a significant vulnerability of many IoT devices?

They receive frequent and regular security updates.

They use complex and unique passwords by default.

They often use weak or default passwords.

They have strong, built-in security features.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a defined risk when IoT and mobile devices are used together?

Enhanced data encryption

Improved device security

A hacked phone can control smart devices.

Automatic security updates for all connected devices

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?