Chapter - 5 IOT Quiz

Chapter - 5 IOT Quiz

Created by
@IrresistibleMemphis9645

Questions and Answers

What type of attack involves recovering encryption information in IoT devices?

Cryptanalysis Attack

What is Mirai Malware related to?

Network Security

What is the process of identifying a person before giving access?

Authentication

In Asymmetric key cryptography, who keeps the private key?

<p>Sender and Receiver</p> Signup and view all the answers

What is the purpose of the Secure Shell (SSH) network protocol?

<p>All of the above</p> Signup and view all the answers

What is a major challenge in IoT?

<p>All of the above</p> Signup and view all the answers

What is the purpose of KP-ABE and CP-ABE?

<p>Privacy protection solution</p> Signup and view all the answers

What does IIOT stand for?

<p>Industrial Internet of Things</p> Signup and view all the answers

Where are public and subscribe keys saved?

<p>PubNub Admin portal</p> Signup and view all the answers

What is the process of converting data into a format that cannot be read by another user?

<p>Encryption</p> Signup and view all the answers

What is a cipher in cryptography?

<p>Both (a) and (b)</p> Signup and view all the answers

What is Artificial Intelligence about?

<p>Making a machine Intelligent</p> Signup and view all the answers

Which key displays public, subscribe, and secret keys in PubNub?

<p>Pane</p> Signup and view all the answers

What type of attack is a botnet often used to launch?

<p>DDoS</p> Signup and view all the answers

What is IoT designed to launch?

<p>Botnet attacks</p> Signup and view all the answers

What is the primary component of an expert system?

<p>Knowledge base</p> Signup and view all the answers

What type of attack is also known as an exhaustive search?

<p>Brute force attack</p> Signup and view all the answers

Which of the following is not an element of IOT?

<p>Data</p> Signup and view all the answers

What is the main security challenge to overcome to make IOT services available at low cost?

<p>Scalability</p> Signup and view all the answers

Which of the following is considered an element of cyber security?

<p>Physical Security</p> Signup and view all the answers

Which protocol is mostly used in Wi-fi Security?

<p>WPA3</p> Signup and view all the answers

What is the most crucial activity in system hacking?

<p>Information gathering</p> Signup and view all the answers

Which language is not commonly used for AI?

<p>Java</p> Signup and view all the answers

What is a common security vulnerability in a system?

<p>Default or hardcoded passwords</p> Signup and view all the answers

What is the type of blockchain network that is restricted to a specific group of people?

<p>Private block chain network</p> Signup and view all the answers

What is the benefit of Blockchain technology that relates to the absence of hidden costs?

<p>No hidden fees</p> Signup and view all the answers

What is the purpose of a Wallet in a Blockchain component?

<p>Storing cryptocurrency</p> Signup and view all the answers

What is the type of cyber security that deals with protecting cloud-based systems?

<p>Cloud Security</p> Signup and view all the answers

What is the abbreviation for Structured Query Language?

<p>SQL</p> Signup and view all the answers

What is the type of attack that involves overwhelming a system with traffic?

<p>Distributed Denial of Service Attack</p> Signup and view all the answers

What is the purpose of a Certificate authority in a Blockchain component?

<p>Issuing certificates</p> Signup and view all the answers

What is the correct combination of security protocols?

<p>Secure Socket Layers and Transport Layer Security</p> Signup and view all the answers

Who created Bitcoin?

<p>Satoshi Nakamoto</p> Signup and view all the answers

How can you secure your data on IOT devices?

<p>All of the above</p> Signup and view all the answers

What is a secret word or number used for protection of devices called?

<p>Passwords</p> Signup and view all the answers

What risks and challenges should be considered in the internet?

<p>All of the above</p> Signup and view all the answers

What is Secure Shell (SSH)?

<p>A Network Protocol</p> Signup and view all the answers

What do you call the scope that a hacker can use to break into a system?

<p>Attack surface</p> Signup and view all the answers

What is a private key?

<p>A key NOT to be given to the public</p> Signup and view all the answers

Who developed Bitcoin?

<p>Satoshi Nakamoto</p> Signup and view all the answers

Study Notes

Cybersecurity

  • Brute force attacks are also known as exhaustive search.
  • The main security challenge to overcome to make IoT services available at low cost is scalability.
  • Network Security, Operational Security, and Application Security are all considered elements of cybersecurity.
  • WPA2 is a protocol commonly used in Wi-Fi security.
  • In system hacking, information gathering is the most crucial activity.
  • Update is a service that permits changes to IoT services.

IoT (Internet of Things)

  • IoT devices are vulnerable to attacks and threats, including cryptanalysis attacks.
  • IoT is designed to launch botnet attacks from Mirai Malware.
  • Energy consumption, security, and network congestion are all challenges in IoT.
  • IIOT stands for Industrial Internet of Things.

Artificial Intelligence

  • Artificial Intelligence is about making a machine intelligent.
  • LISP, Prolog, and Python are languages commonly used for AI, while Perl is not.

Cryptography

  • Cryptanalysis attack involves recovering encryption information.
  • In Asymmetric key cryptography, the private key is kept by the receiver.
  • Secure shell (SSH) network protocol is used for remote command-line login, remote command execution, and secure data communication.
  • SSL and TLS stand for Secure Socket Layers and Transport Layer Security.

Blockchain

  • Blockchain technology benefits include no hidden fees, security, speed, fraud control, and access levels.
  • Private block chain network is a type of blockchain network.
  • Ledger, Wallet, and Certificate authority are all components of blockchain technology, while Hash is not.

Miscellaneous

  • A private key is a key NOT to be given to the public.
  • Secure data on IoT devices by keeping changing passwords, updating devices, and avoiding risky devices.
  • The term "Attack surface" refers to the scope that a hacker can use to break into a system.
  • Cloud workload protection platforms are used for the safety and protection of information in the cloud.

Important Abbreviations

  • SQL: Structured Query Language
  • DNS: Domain Name System
  • PKI: Public Key Infrastructure
  • MFA: Multi Factor Authentication
  • UPnP: Universal Plug & Play Features
  • WPA: Wi-Fi Protected Access
  • WPA2: Wi-Fi Protected Access 2
  • WPA3: Wi-Fi Protected Access 3
  • DDOS: Distributed Denial of Service Attack
  • DES: Data Encryption Standard
  • MACs: Message Authentication Codes
  • AI: Artificial Intelligence
  • ML: Machine Learning
  • IIOT: Internet of Intelligent Things
  • NLP: Natural Language Processing
  • STT: Speech to text
  • ASI: Artificial Super Intelligence

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team
Use Quizgecko on...
Browser
Browser