Full Transcript

Ch-5 (M4-R5.1) Important One Word Questions. Ques1. Mobile device management similar to that of ________protection with respect to locking Ans. end point Ques2. Which filtering is a security measure on various wireless networks Ans. MAC Ques3. Passwords are used to improve the of...

Ch-5 (M4-R5.1) Important One Word Questions. Ques1. Mobile device management similar to that of ________protection with respect to locking Ans. end point Ques2. Which filtering is a security measure on various wireless networks Ans. MAC Ques3. Passwords are used to improve the of a network Ans. security Ques4. IOT-A reference model is a both _________. Ans. Scalable and Secure Quees5. Al is also named as ____________. Ans. Context aware, personalized, and adaptive Ques6. The Applications of Al are ___________ Ans. Expert system, Gaming, and Vision Systems etc Ques7. Dictionary attacks is a kind of __________ Ans. Brute force attack https://www.youtube.com/@zedkinggroupofinstitutions1663 @zedkinginstitute Ques8. Which attack are based on dictionary attack techniques Ans. Hybrid attacks Ques9. Who is the Father of AI. Ans. John McCarthy Ques10. IoT devices are naturally vulnerable to _________ threats. Ans. Security Ques11. The main components of an M2M system include ________programmed to help a network device interpret data and make decisions. Ans. Sensors, RFID, a Wi-Fi or communication link, and autonomic computing software Ques12. What are the pillers of blockchain technology. Ans. Transparency, Immutability, Decentralization Ques13. Which is one of the most famous IOT security attack Ans. The Mirai botnet Ques14. What are the strong security protocol Ans. HTTPS, SSL, SFTP Ques15. Which Technology used in Bitcoin Ans. Block chain Ques16. What is a type of software designed to help the user's computer detect viruses and avoid them? Ans. Antivirus Ques17. The role of Big Data in IoT's Smart Grid architecture is _________ Ans. Store data https://www.youtube.com/@zedkinggroupofinstitutions1663 @zedkinginstitute Ques18. What prevents someone from denying the accessed resource? Ans. Non-repudiation Ques19. In the IOT network, Secure Shell(SSH) is _________network protocol Ans. Secure Ques20. What is the most discussed challenge in IOT? Ans. Security Ques21. These applications take data or input from various devices and convert it into viable actions or clear patterns for human analysis? Ans. Real Time Analytics Ques22. The scope that hacker can use to break into a system is called as: Ans. Attack surface Ques23. Which process is used to keep track of user's activity Ans. Accounting Ques24. The main objective of WOT(Web of Things) is: Ans. Improve usability and interoperability Ques25. Which one is the most discussed challenge in IoT ? Ans. a) Standard b) Security c) Regulation d) Internet Ques26. The scope that hacker can use to break into a system is called as: Ans. a) Attack surface b) Defense c) Principle of least privilege d) Risk mitigation Ques27. Which of the following prevents someone from denying the accessed resource? https://www.youtube.com/@zedkinggroupofinstitutions1663 @zedkinginstitute Ans. a) Accounting b) Non-repudiation c) Sniffing d) Authorization Ques28. Which of the following process is used to keep track of user’s activity ? Ans. a) Authentication b) Authoring c) Authorization d) Accounting Ques29. Which of the following is used for risk analysis? Ans. a) OWASP b) STRIDE c) DREAD d) DAR Ques30. Which of the following is not an element of threat modelling? Ans. a) Asset b) Vulnerability c) Threat d) Time Ques31. Identify the challenge coming under securing the information Ans. a) Security b) Signaling c) Power Consumption d) Presence Detection Ques32. IoT devices are vulnerable to attacks and threats. One of them is Cryptanalysis attack that means: Ans. a) By recovering the encryption information b) Inject malicious codes c) Find ciphertext to break the encryption d) Tamper with the hardware Ques33. In Asymmetric key cryptography, the private key is kept by: Ans. a) Sender and Receiver b) Receiver c) Both a) & b) d) None of the above Ques34. Secure shell (SSH) network protocol is used for: Ans. a) Remote command-line login b) Remote command execution c) Secure data communication d) All of the mentioned https://www.youtube.com/@zedkinggroupofinstitutions1663 @zedkinginstitute Ques35. Privacy protection solution was proposed with KP-ABE and CP-ABE Ans. a) True b) False c) May be d) None of these Ques36. _______and________ saves the public and subscribe keys that we have generated with the PubNub Admin portal Ans. a) Public_key and subscribe_key b) Public-key and subscribe-key c) Publickey and subscribekey d) Key_public and key_subscribe Ques38. Artificial Intelligence is about_ Ans. a) Playing a game on Computer b) Making a machine Intelligent c) Programming on machine with your own intelligence d) Putting your intelligence into machine Ques39. By clicking which key the PubNub will display public, subscribe, and secret keys? Ans. a) Pane b) Demo Keyset c) Portal d) Network Ques40. IoT is designed to launch botnet attacks from Ans. a) Mirai Malware b) Virus c) Program d) None of these Ques41. Which among the following terms is related to network security? Ans. a) DSL b) W3C c) MIT d) Firewall Ques42. What are the challenges in IOT? Ans. a) Energy Consumption b) Security c) Network Congestion d) All of above https://www.youtube.com/@zedkinggroupofinstitutions1663 @zedkinginstitute Ques43. _________is the process of identifying a person before giving an access ? Ans. a) Auditing b) Authorisation c) Authentication d) Accounting Ques44. IOT security management includes ________? Ans. a) Protocol abstraction b) Simple and fast installation c) Security with hardware d) Data storage Ques45. Botnet is often used to launch ________attack? Ans. a) DoS b) DDoS c) Brute force d) Passive Ques46. The IIOT stands for: Ans. a) Indepth Internet of T b) Innovative Internet of Things c) Industrial Internet of Things d) Information Internet of Things Ques47. The process of converting data into a format that can not be read by another use? Ans. a) Encryption b) Registring c) Locking d) None Ques48. In cryptography, What is cipher? Ans. a) Encrypted message b) Algorithm for performing encryption and decryption c) Both (a) and (b) d) None of the above Ques49. Term SSL and TLS stand for: https://www.youtube.com/@zedkinggroupofinstitutions1663 @zedkinginstitute Ans. a) Session Socket Layers and Transport Layer Session b) Secure Socket Layers and Transport Layer Security c) Secure Socket Layout and Transport Level Session d) Series Socket Layers and Transport Layer Session Ques50. Who created Bitcoin? Ans. a) Satoshi Nakamoto b) Samsung c) Jhon Mcaffee d) China Ques51. To secure your data on IOT devices: Ans. a) Keep changing your passwords b) Update your every device c) Avoid using devices that are risky d) All of the above Ques52. Secret words or numbers used for protection of devices is called? Ans. a) Biometric Data b) Private Data c) Private Data d) Backup Ques53. What risks and challenges should be considered in the internet? Ans. a) Privacy and Security b) Energy consumption c) Network congestion d) All of the above Ques54. What is Secure Shell (SSH)? Ans. a) A router b) A Firewall c) A Network Protocol d) Python Shell Ques55. What do you call the scope that hacker can use to break into a system? Ans. a) Principle of least privilege b) Defence in depth c) Attack surface d) None of the above Ques56. Which of the following plateform is used for the safety and protection of information in the cloud? Ans. a) Cloud workload protection plateforms b) AWS https://www.youtube.com/@zedkinggroupofinstitutions1663 @zedkinginstitute c) cloud security protocols d) one Drive Ques57. What is a private key? Ans. a) A key on your key chain b) A key given to the public c) A key NOT to be given to the public d) A key that opens a secret door Ques58. The component of an Expert System is_ Ans. a) Knowledge base b) Inference Engine c) User Interface d) All of the above Ques59. Brute force attacks are known as an_key search. Ans. a) Exhaustive b) Phising c) Cryptographic d) None of these Ques60. Which one not an element of IOT? Ans. a) Security b) People c) Process d) Things Ques61. The main security challenge to overcome to make IOT services available at low cost is? Ans. a) Open security b) Scalability c) Detachment d) None of these Ques62. Which of the following is considered an element of cyber security? Ans. a) Network Security b) Operational Security c) Application Security d) All of the Above Ques63. Which protocol mostly used in Wi-fi Security? Ans. a) WPS b) WPA c) WPA2 d) Both b) and c) Ques64. In system hacking, which of the following is the most crucial activity? https://www.youtube.com/@zedkinggroupofinstitutions1663 @zedkinginstitute Ans. a) Information gathering b) Covering tracks c) Cracking passwords d) None of the above Ques65. Which service permits the changes to the IoT services? Ans. a) Update b) Registered service status c) Enable from suspension d) Enable Ques66. Which of the given language is not commonly used for AI? Ans. a) LISP b) Prolog c) Python d) Perl Ques67. Which are the Machine to Machine communication applications? Ans. a) Environment monitoring b) Civil protection and public safety c) Supply chain management d) All of the Above Ques68. Which are the components of the M2M communication? Ans. a) Device providers, ISPs b) Service users c) Platform and service providers d) All of the above Ques69. The M2M is __________ based technology. Ans. a) Software b) Hardware c) Both a and b d) None of the Above Ques70. Which one is an example for M2M? Ans. a) Remote Monitoring b) Smart Cities c) Smart Agriculture d) All of the Above Ques71. The future IoT trust infrastructures are based on which technology for business-critical interaction between devices without direct human interaction? Ans. a) XML b) Blockchain c).Net d) All of the above https://www.youtube.com/@zedkinggroupofinstitutions1663 @zedkinginstitute Ques72. Which is the future application of IOT? Ans. a) QoS in communication b) Role of Green IOT system c) Secure communication d) Multimedia communication Ques73. An AI agent perceives and acts upon the environment using__________ Ans. a) Sensors b) perceiver c) Actuators d) Both A and C Ques74. The term 'bot' comes from robot. An internet bot may also known as: Ans. a) Web robot b) www robot c) Both (A) and (B) d) None of these Ques75. Which statement(s) are true about a brute force attack? Ans. a) Crack a password or username b) Find a hidden web page c) find the key used to encrypt a message d) All of the above Ques76. The poor security practices could include(s) Ans. a) No system hardening b) No mechanism for updating software c) Default or hardcoded passwords d) All of the above Ques77. Identify one of the types of the blockchain network. Ans. a) Open block chain network b) Constraint block chain network c) Private block chain network d) Restricted block chain network Ques78. Benefits of Blockchain technology are: Ans. a) No hidden fees b) Security & speed c) Fraud control & Access levels d) All of the Above https://www.youtube.com/@zedkinggroupofinstitutions1663 @zedkinginstitute Ques79. Which of the following is not a Blockchain component? Ans. a) Ledger b) Wallet c) Certificate authority d) Hash Ques80. Where do you keep your cryptocurrency? Ans. a) Wallet b) Bank Account c) Floppy disk d) In your pocket Ques81. Which of the following is a type of cyber security? Ans. a) Cloud Security b) Network Security c) Application Security d) All of the above Some Important Abbreviations:- 1. SQL Structured Query Language 2. DNS Domain Name System 3. PKI Public Key Infrastructure 4. MFA Multi Factor Authentication 5. UPnP Universal Plug & Play Features 6. WPA Wi-Fi Protected Access 7. WPA2 Wi-Fi Protected Access 2 8. WPA3 Wi-Fi Protected Access 3 9. DDOS Distributed Denial of Service Attack 10. DES Data Encryption Standard 11. MACs Message Authentication Codes 12. AI Artificial Intelligence 13. ML Machine Learning 14. IIOT Internet of Intelligent Things 15. NLP Natural Language Processing 16. STT Speech to text 17. ASI Artificial Super Intelligence 18. RPA Robotics Process Automation https://www.youtube.com/@zedkinggroupofinstitutions1663 @zedkinginstitute

Use Quizgecko on...
Browser
Browser