Questions and Answers
What type of attack involves recovering encryption information in IoT devices?
Cryptanalysis Attack
What is Mirai Malware related to?
Network Security
What is the process of identifying a person before giving access?
Authentication
In Asymmetric key cryptography, who keeps the private key?
Signup and view all the answers
What is the purpose of the Secure Shell (SSH) network protocol?
Signup and view all the answers
What is a major challenge in IoT?
Signup and view all the answers
What is the purpose of KP-ABE and CP-ABE?
Signup and view all the answers
What does IIOT stand for?
Signup and view all the answers
Where are public and subscribe keys saved?
Signup and view all the answers
What is the process of converting data into a format that cannot be read by another user?
Signup and view all the answers
What is a cipher in cryptography?
Signup and view all the answers
What is Artificial Intelligence about?
Signup and view all the answers
Which key displays public, subscribe, and secret keys in PubNub?
Signup and view all the answers
What type of attack is a botnet often used to launch?
Signup and view all the answers
What is IoT designed to launch?
Signup and view all the answers
What is the primary component of an expert system?
Signup and view all the answers
What type of attack is also known as an exhaustive search?
Signup and view all the answers
Which of the following is not an element of IOT?
Signup and view all the answers
What is the main security challenge to overcome to make IOT services available at low cost?
Signup and view all the answers
Which of the following is considered an element of cyber security?
Signup and view all the answers
Which protocol is mostly used in Wi-fi Security?
Signup and view all the answers
What is the most crucial activity in system hacking?
Signup and view all the answers
Which language is not commonly used for AI?
Signup and view all the answers
What is a common security vulnerability in a system?
Signup and view all the answers
What is the type of blockchain network that is restricted to a specific group of people?
Signup and view all the answers
What is the benefit of Blockchain technology that relates to the absence of hidden costs?
Signup and view all the answers
What is the purpose of a Wallet in a Blockchain component?
Signup and view all the answers
What is the type of cyber security that deals with protecting cloud-based systems?
Signup and view all the answers
What is the abbreviation for Structured Query Language?
Signup and view all the answers
What is the type of attack that involves overwhelming a system with traffic?
Signup and view all the answers
What is the purpose of a Certificate authority in a Blockchain component?
Signup and view all the answers
What is the correct combination of security protocols?
Signup and view all the answers
Who created Bitcoin?
Signup and view all the answers
How can you secure your data on IOT devices?
Signup and view all the answers
What is a secret word or number used for protection of devices called?
Signup and view all the answers
What risks and challenges should be considered in the internet?
Signup and view all the answers
What is Secure Shell (SSH)?
Signup and view all the answers
What do you call the scope that a hacker can use to break into a system?
Signup and view all the answers
What is a private key?
Signup and view all the answers
Who developed Bitcoin?
Signup and view all the answers
Study Notes
Cybersecurity
- Brute force attacks are also known as exhaustive search.
- The main security challenge to overcome to make IoT services available at low cost is scalability.
- Network Security, Operational Security, and Application Security are all considered elements of cybersecurity.
- WPA2 is a protocol commonly used in Wi-Fi security.
- In system hacking, information gathering is the most crucial activity.
- Update is a service that permits changes to IoT services.
IoT (Internet of Things)
- IoT devices are vulnerable to attacks and threats, including cryptanalysis attacks.
- IoT is designed to launch botnet attacks from Mirai Malware.
- Energy consumption, security, and network congestion are all challenges in IoT.
- IIOT stands for Industrial Internet of Things.
Artificial Intelligence
- Artificial Intelligence is about making a machine intelligent.
- LISP, Prolog, and Python are languages commonly used for AI, while Perl is not.
Cryptography
- Cryptanalysis attack involves recovering encryption information.
- In Asymmetric key cryptography, the private key is kept by the receiver.
- Secure shell (SSH) network protocol is used for remote command-line login, remote command execution, and secure data communication.
- SSL and TLS stand for Secure Socket Layers and Transport Layer Security.
Blockchain
- Blockchain technology benefits include no hidden fees, security, speed, fraud control, and access levels.
- Private block chain network is a type of blockchain network.
- Ledger, Wallet, and Certificate authority are all components of blockchain technology, while Hash is not.
Miscellaneous
- A private key is a key NOT to be given to the public.
- Secure data on IoT devices by keeping changing passwords, updating devices, and avoiding risky devices.
- The term "Attack surface" refers to the scope that a hacker can use to break into a system.
- Cloud workload protection platforms are used for the safety and protection of information in the cloud.
Important Abbreviations
- SQL: Structured Query Language
- DNS: Domain Name System
- PKI: Public Key Infrastructure
- MFA: Multi Factor Authentication
- UPnP: Universal Plug & Play Features
- WPA: Wi-Fi Protected Access
- WPA2: Wi-Fi Protected Access 2
- WPA3: Wi-Fi Protected Access 3
- DDOS: Distributed Denial of Service Attack
- DES: Data Encryption Standard
- MACs: Message Authentication Codes
- AI: Artificial Intelligence
- ML: Machine Learning
- IIOT: Internet of Intelligent Things
- NLP: Natural Language Processing
- STT: Speech to text
- ASI: Artificial Super Intelligence
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.