Chapter - 5 IOT Quiz
40 Questions
4 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of attack involves recovering encryption information in IoT devices?

  • Cryptanalysis Attack (correct)
  • Brute Force Attack
  • Phishing Attack
  • SQL Injection Attack

What is Mirai Malware related to?

  • Program
  • Virus
  • Network Security (correct)
  • None of these

What is the process of identifying a person before giving access?

  • Authorisation
  • Auditing
  • Authentication (correct)
  • Accounting

In Asymmetric key cryptography, who keeps the private key?

<p>Sender and Receiver (A)</p> Signup and view all the answers

What is the purpose of the Secure Shell (SSH) network protocol?

<p>All of the above (D)</p> Signup and view all the answers

What is a major challenge in IoT?

<p>All of the above (D)</p> Signup and view all the answers

What is the purpose of KP-ABE and CP-ABE?

<p>Privacy protection solution (B)</p> Signup and view all the answers

What does IIOT stand for?

<p>Industrial Internet of Things (D)</p> Signup and view all the answers

Where are public and subscribe keys saved?

<p>PubNub Admin portal (C)</p> Signup and view all the answers

What is the process of converting data into a format that cannot be read by another user?

<p>Encryption (A)</p> Signup and view all the answers

What is a cipher in cryptography?

<p>Both (a) and (b) (C)</p> Signup and view all the answers

What is Artificial Intelligence about?

<p>Making a machine Intelligent (D)</p> Signup and view all the answers

Which key displays public, subscribe, and secret keys in PubNub?

<p>Pane (A)</p> Signup and view all the answers

What type of attack is a botnet often used to launch?

<p>DDoS (D)</p> Signup and view all the answers

What is IoT designed to launch?

<p>Botnet attacks (B)</p> Signup and view all the answers

What is the primary component of an expert system?

<p>Knowledge base (C)</p> Signup and view all the answers

What type of attack is also known as an exhaustive search?

<p>Brute force attack (D)</p> Signup and view all the answers

Which of the following is not an element of IOT?

<p>Data (B)</p> Signup and view all the answers

What is the main security challenge to overcome to make IOT services available at low cost?

<p>Scalability (C)</p> Signup and view all the answers

Which of the following is considered an element of cyber security?

<p>Physical Security (B)</p> Signup and view all the answers

Which protocol is mostly used in Wi-fi Security?

<p>WPA3 (C)</p> Signup and view all the answers

What is the most crucial activity in system hacking?

<p>Information gathering (A)</p> Signup and view all the answers

Which language is not commonly used for AI?

<p>Java (B)</p> Signup and view all the answers

What is a common security vulnerability in a system?

<p>Default or hardcoded passwords (D)</p> Signup and view all the answers

What is the type of blockchain network that is restricted to a specific group of people?

<p>Private block chain network (A)</p> Signup and view all the answers

What is the benefit of Blockchain technology that relates to the absence of hidden costs?

<p>No hidden fees (A)</p> Signup and view all the answers

What is the purpose of a Wallet in a Blockchain component?

<p>Storing cryptocurrency (B)</p> Signup and view all the answers

What is the type of cyber security that deals with protecting cloud-based systems?

<p>Cloud Security (A)</p> Signup and view all the answers

What is the abbreviation for Structured Query Language?

<p>SQL (B)</p> Signup and view all the answers

What is the type of attack that involves overwhelming a system with traffic?

<p>Distributed Denial of Service Attack (A)</p> Signup and view all the answers

What is the purpose of a Certificate authority in a Blockchain component?

<p>Issuing certificates (D)</p> Signup and view all the answers

What is the correct combination of security protocols?

<p>Secure Socket Layers and Transport Layer Security (D)</p> Signup and view all the answers

Who created Bitcoin?

<p>Satoshi Nakamoto (B)</p> Signup and view all the answers

How can you secure your data on IOT devices?

<p>All of the above (D)</p> Signup and view all the answers

What is a secret word or number used for protection of devices called?

<p>Passwords (D)</p> Signup and view all the answers

What risks and challenges should be considered in the internet?

<p>All of the above (D)</p> Signup and view all the answers

What is Secure Shell (SSH)?

<p>A Network Protocol (C)</p> Signup and view all the answers

What do you call the scope that a hacker can use to break into a system?

<p>Attack surface (C)</p> Signup and view all the answers

What is a private key?

<p>A key NOT to be given to the public (C)</p> Signup and view all the answers

Who developed Bitcoin?

<p>Satoshi Nakamoto (B)</p> Signup and view all the answers

Study Notes

Cybersecurity

  • Brute force attacks are also known as exhaustive search.
  • The main security challenge to overcome to make IoT services available at low cost is scalability.
  • Network Security, Operational Security, and Application Security are all considered elements of cybersecurity.
  • WPA2 is a protocol commonly used in Wi-Fi security.
  • In system hacking, information gathering is the most crucial activity.
  • Update is a service that permits changes to IoT services.

IoT (Internet of Things)

  • IoT devices are vulnerable to attacks and threats, including cryptanalysis attacks.
  • IoT is designed to launch botnet attacks from Mirai Malware.
  • Energy consumption, security, and network congestion are all challenges in IoT.
  • IIOT stands for Industrial Internet of Things.

Artificial Intelligence

  • Artificial Intelligence is about making a machine intelligent.
  • LISP, Prolog, and Python are languages commonly used for AI, while Perl is not.

Cryptography

  • Cryptanalysis attack involves recovering encryption information.
  • In Asymmetric key cryptography, the private key is kept by the receiver.
  • Secure shell (SSH) network protocol is used for remote command-line login, remote command execution, and secure data communication.
  • SSL and TLS stand for Secure Socket Layers and Transport Layer Security.

Blockchain

  • Blockchain technology benefits include no hidden fees, security, speed, fraud control, and access levels.
  • Private block chain network is a type of blockchain network.
  • Ledger, Wallet, and Certificate authority are all components of blockchain technology, while Hash is not.

Miscellaneous

  • A private key is a key NOT to be given to the public.
  • Secure data on IoT devices by keeping changing passwords, updating devices, and avoiding risky devices.
  • The term "Attack surface" refers to the scope that a hacker can use to break into a system.
  • Cloud workload protection platforms are used for the safety and protection of information in the cloud.

Important Abbreviations

  • SQL: Structured Query Language
  • DNS: Domain Name System
  • PKI: Public Key Infrastructure
  • MFA: Multi Factor Authentication
  • UPnP: Universal Plug & Play Features
  • WPA: Wi-Fi Protected Access
  • WPA2: Wi-Fi Protected Access 2
  • WPA3: Wi-Fi Protected Access 3
  • DDOS: Distributed Denial of Service Attack
  • DES: Data Encryption Standard
  • MACs: Message Authentication Codes
  • AI: Artificial Intelligence
  • ML: Machine Learning
  • IIOT: Internet of Intelligent Things
  • NLP: Natural Language Processing
  • STT: Speech to text
  • ASI: Artificial Super Intelligence

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Ch-5 MCQ (M4-R5.1).pdf

Description

Test your knowledge of Iot Ch-5th concepts, including AI, security, and IoT. This quiz covers various topics, including knowledge base, inference engine, and brute force attacks.

More Like This

Use Quizgecko on...
Browser
Browser