Chapter - 5 IOT Quiz
40 Questions
4 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of attack involves recovering encryption information in IoT devices?

  • Cryptanalysis Attack (correct)
  • Brute Force Attack
  • Phishing Attack
  • SQL Injection Attack
  • What is Mirai Malware related to?

  • Program
  • Virus
  • Network Security (correct)
  • None of these
  • What is the process of identifying a person before giving access?

  • Authorisation
  • Auditing
  • Authentication (correct)
  • Accounting
  • In Asymmetric key cryptography, who keeps the private key?

    <p>Sender and Receiver</p> Signup and view all the answers

    What is the purpose of the Secure Shell (SSH) network protocol?

    <p>All of the above</p> Signup and view all the answers

    What is a major challenge in IoT?

    <p>All of the above</p> Signup and view all the answers

    What is the purpose of KP-ABE and CP-ABE?

    <p>Privacy protection solution</p> Signup and view all the answers

    What does IIOT stand for?

    <p>Industrial Internet of Things</p> Signup and view all the answers

    Where are public and subscribe keys saved?

    <p>PubNub Admin portal</p> Signup and view all the answers

    What is the process of converting data into a format that cannot be read by another user?

    <p>Encryption</p> Signup and view all the answers

    What is a cipher in cryptography?

    <p>Both (a) and (b)</p> Signup and view all the answers

    What is Artificial Intelligence about?

    <p>Making a machine Intelligent</p> Signup and view all the answers

    Which key displays public, subscribe, and secret keys in PubNub?

    <p>Pane</p> Signup and view all the answers

    What type of attack is a botnet often used to launch?

    <p>DDoS</p> Signup and view all the answers

    What is IoT designed to launch?

    <p>Botnet attacks</p> Signup and view all the answers

    What is the primary component of an expert system?

    <p>Knowledge base</p> Signup and view all the answers

    What type of attack is also known as an exhaustive search?

    <p>Brute force attack</p> Signup and view all the answers

    Which of the following is not an element of IOT?

    <p>Data</p> Signup and view all the answers

    What is the main security challenge to overcome to make IOT services available at low cost?

    <p>Scalability</p> Signup and view all the answers

    Which of the following is considered an element of cyber security?

    <p>Physical Security</p> Signup and view all the answers

    Which protocol is mostly used in Wi-fi Security?

    <p>WPA3</p> Signup and view all the answers

    What is the most crucial activity in system hacking?

    <p>Information gathering</p> Signup and view all the answers

    Which language is not commonly used for AI?

    <p>Java</p> Signup and view all the answers

    What is a common security vulnerability in a system?

    <p>Default or hardcoded passwords</p> Signup and view all the answers

    What is the type of blockchain network that is restricted to a specific group of people?

    <p>Private block chain network</p> Signup and view all the answers

    What is the benefit of Blockchain technology that relates to the absence of hidden costs?

    <p>No hidden fees</p> Signup and view all the answers

    What is the purpose of a Wallet in a Blockchain component?

    <p>Storing cryptocurrency</p> Signup and view all the answers

    What is the type of cyber security that deals with protecting cloud-based systems?

    <p>Cloud Security</p> Signup and view all the answers

    What is the abbreviation for Structured Query Language?

    <p>SQL</p> Signup and view all the answers

    What is the type of attack that involves overwhelming a system with traffic?

    <p>Distributed Denial of Service Attack</p> Signup and view all the answers

    What is the purpose of a Certificate authority in a Blockchain component?

    <p>Issuing certificates</p> Signup and view all the answers

    What is the correct combination of security protocols?

    <p>Secure Socket Layers and Transport Layer Security</p> Signup and view all the answers

    Who created Bitcoin?

    <p>Satoshi Nakamoto</p> Signup and view all the answers

    How can you secure your data on IOT devices?

    <p>All of the above</p> Signup and view all the answers

    What is a secret word or number used for protection of devices called?

    <p>Passwords</p> Signup and view all the answers

    What risks and challenges should be considered in the internet?

    <p>All of the above</p> Signup and view all the answers

    What is Secure Shell (SSH)?

    <p>A Network Protocol</p> Signup and view all the answers

    What do you call the scope that a hacker can use to break into a system?

    <p>Attack surface</p> Signup and view all the answers

    What is a private key?

    <p>A key NOT to be given to the public</p> Signup and view all the answers

    Who developed Bitcoin?

    <p>Satoshi Nakamoto</p> Signup and view all the answers

    Study Notes

    Cybersecurity

    • Brute force attacks are also known as exhaustive search.
    • The main security challenge to overcome to make IoT services available at low cost is scalability.
    • Network Security, Operational Security, and Application Security are all considered elements of cybersecurity.
    • WPA2 is a protocol commonly used in Wi-Fi security.
    • In system hacking, information gathering is the most crucial activity.
    • Update is a service that permits changes to IoT services.

    IoT (Internet of Things)

    • IoT devices are vulnerable to attacks and threats, including cryptanalysis attacks.
    • IoT is designed to launch botnet attacks from Mirai Malware.
    • Energy consumption, security, and network congestion are all challenges in IoT.
    • IIOT stands for Industrial Internet of Things.

    Artificial Intelligence

    • Artificial Intelligence is about making a machine intelligent.
    • LISP, Prolog, and Python are languages commonly used for AI, while Perl is not.

    Cryptography

    • Cryptanalysis attack involves recovering encryption information.
    • In Asymmetric key cryptography, the private key is kept by the receiver.
    • Secure shell (SSH) network protocol is used for remote command-line login, remote command execution, and secure data communication.
    • SSL and TLS stand for Secure Socket Layers and Transport Layer Security.

    Blockchain

    • Blockchain technology benefits include no hidden fees, security, speed, fraud control, and access levels.
    • Private block chain network is a type of blockchain network.
    • Ledger, Wallet, and Certificate authority are all components of blockchain technology, while Hash is not.

    Miscellaneous

    • A private key is a key NOT to be given to the public.
    • Secure data on IoT devices by keeping changing passwords, updating devices, and avoiding risky devices.
    • The term "Attack surface" refers to the scope that a hacker can use to break into a system.
    • Cloud workload protection platforms are used for the safety and protection of information in the cloud.

    Important Abbreviations

    • SQL: Structured Query Language
    • DNS: Domain Name System
    • PKI: Public Key Infrastructure
    • MFA: Multi Factor Authentication
    • UPnP: Universal Plug & Play Features
    • WPA: Wi-Fi Protected Access
    • WPA2: Wi-Fi Protected Access 2
    • WPA3: Wi-Fi Protected Access 3
    • DDOS: Distributed Denial of Service Attack
    • DES: Data Encryption Standard
    • MACs: Message Authentication Codes
    • AI: Artificial Intelligence
    • ML: Machine Learning
    • IIOT: Internet of Intelligent Things
    • NLP: Natural Language Processing
    • STT: Speech to text
    • ASI: Artificial Super Intelligence

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Ch-5 MCQ (M4-R5.1).pdf

    Description

    Test your knowledge of Iot Ch-5th concepts, including AI, security, and IoT. This quiz covers various topics, including knowledge base, inference engine, and brute force attacks.

    More Like This

    Use Quizgecko on...
    Browser
    Browser