IoT Chapter 5 Test Review PDF
Document Details
Uploaded by SignificantIguana4490
Jadara University
Tags
Related
- Chapter 13 - 03 - Understand OT Concepts, Devices, and Protocols PDF
- Certified Cybersecurity Technician Exam 212-82 PDF
- IoT Device Management PDF
- Chapter 13 - 03 - Understand OT Concepts, Devices, and Protocols - 01 PDF
- Introduction to IoT Security PDF
- Authentication and Authorization of Devices in IoT PDF
Summary
This document contains a review of IoT Chapter 5, covering various IoT concepts, including protocols, security challenges, and cryptographic algorithms. It includes multiple-choice questions and answers focusing on common IoT concepts.
Full Transcript
IoT Chapter 5: 1. What does IoT stand for? a) Internet of Transactions b) Internet of Things c) Internet of Technology d) Internet of Tools Answer: b) Internet of Things 2. Which protocol is foreseen as the standard for IoT interoperability? a) IPv4...
IoT Chapter 5: 1. What does IoT stand for? a) Internet of Transactions b) Internet of Things c) Internet of Technology d) Internet of Tools Answer: b) Internet of Things 2. Which protocol is foreseen as the standard for IoT interoperability? a) IPv4 b) IPv6 c) HTTP d) FTP Answer: b) IPv6 3. What are common security challenges in IoT? a) Low computational power of devices b) Standardization and interoperability c) Privacy threats and data breaches d) All of the above Answer: d) All of the above 4. What is the primary role of lightweight cryptographic algorithms in IoT? a) Replace conventional cryptographic algorithms b) Minimize processing and memory usage c) Increase the complexity of encryption d) Replace symmetric cryptography with asymmetric methods Answer: b) Minimize processing and memory usage 5. Which of the following is a property of secure communication in IoT? a) Confidentiality b) Integrity c) Authenticity d) All of the above Answer: d) All of the above 6. What type of attack involves substituting smart devices during installation? a) Routing attack b) Firmware replacement attack c) Malicious substitution attack d) Denial-of-service attack Answer: c) Malicious substitution attack 7. What does DTLS stand for in IoT security protocols? a) Datagram Transport Layer Security b) Distributed Transport Level Security c) Data Transmission Level System d) Data Transport Layer Security Answer: a) Datagram Transport Layer Security 8. Which protocol is specifically designed for resource-constrained devices? a) HTTP b) CoAP c) FTP d) SMTP Answer: b) CoAP 9. What is the primary benefit of using ECC (Elliptic Curve Cryptography) in IoT? a) Requires long keys for high security b) Provides higher security with shorter keys c) Replaces symmetric cryptography d) Increases computational complexity Answer: b) Provides higher security with shorter keys 10. What is the primary goal of lightweight cryptographic hash functions in IoT? a) Increase hardware efficiency b) Ensure faster decryption c) Enhance key length requirements d) Minimize resource usage in constrained devices Answer: d) Minimize resource usage in constrained devices 11. What is the purpose of CoAP in IoT? a) To provide a lightweight alternative to HTTP b) To ensure secure multicast communication c) To replace TCP in constrained networks d) To provide routing for large networks Answer: a) To provide a lightweight alternative to HTTP 12. What is a key feature of the 6LoWPAN protocol? a) Compression of IPv6 headers b) Encryption of IPv6 packets c) Replacement of UDP with TCP d) Elimination of routing tables Answer: a) Compression of IPv6 headers 13. What does the PRESENT cipher primarily target? a) High computational power systems b) Constrained environments with low power consumption c) Large-scale encryption networks d) Long-term data storage Answer: b) Constrained environments with low power consumption 14. Which attack exploits unprotected communication channels in IoT? a) Man-in-the-middle attack b) Key distribution attack c) Firmware update attack d) Routing attack Answer: a) Man-in-the-middle attack 15. What does the term “forward secrecy” in IoT security imply? a) Old group members cannot access current communications b) Current group members cannot access old communications c) Communications are stored for future analysis d) Data is encrypted in future network layers Answer: a) Old group members cannot access current communications 16. What is a disadvantage of RSA encryption for IoT devices? a) Small key size b) High computational requirements c) Lack of data integrity d) Incompatibility with ECC Answer: b) High computational requirements 17. Which is an example of a lightweight block cipher algorithm? a) AES b) PRESENT c) MD5 d) Diffie-Hellman Answer: b) PRESENT 18. What does the term “homomorphic encryption” refer to? a) Encryption of homogeneous datasets b) Computation on encrypted data without decryption c) Storage of data in a compressed format d) Secure transmission of identical data packets Answer: b) Computation on encrypted data without decryption 19. What is the primary function of a Security Gateway in IoT networks? a) To act as a firewall b) To compress packets in the network c) To prevent unauthorized access to internal networks d) To handle multicast routing efficiently Answer: c) To prevent unauthorized access to internal networks 20. What mechanism can be used to achieve multicast security in IoT? a) DTLS records b) AES encryption c) IPv6 compression d) CoAP tunneling Answer: a) DTLS records 21. Which cryptographic method is used to generate a shared key for secure communication? a) RSA b) Diffie-Hellman c) AES d) TEA Answer: b) Diffie-Hellman 22. What is the purpose of a cryptographic hash function in IoT? a) To encrypt large datasets b) To provide data integrity and authentication c) To replace public-key cryptography d) To compress data for storage Answer: b) To provide data integrity and authentication 23. What is a common characteristic of lightweight cryptographic algorithms? a) High memory usage b) Short keys and low power consumption c) Use of only asymmetric keys d) High-speed data transmission Answer: b) Short keys and low power consumption 24. What is the primary challenge of implementing IPSec in IoT? a) Lack of confidentiality features b) Excessive resource consumption in constrained devices c) Difficulty in providing integrity d) Incompatibility with IPv4 networks Answer: b) Excessive resource consumption in constrained devices 25. What is the main advantage of Elliptic Curve Cryptography (ECC) over RSA in IoT? a) ECC provides longer encryption keys b) ECC uses less computational power c) ECC is easier to configure d) ECC is more efficient in securing multicast communication Answer: b) ECC uses less computational power 26. What is the main purpose of the Scalable Encryption Algorithm (SEA)? a) To provide encryption for large data centers b) To support flexibility and adaptability for constrained devices c) To compress large amounts of data d) To replace traditional cryptographic protocols Answer: b) To support flexibility and adaptability for constrained devices 27. Which protocol helps secure end-to-end communication at the transport layer in IoT? a) IPSec b) DTLS c) CoAP d) FTP Answer: b) DTLS 28. What is the primary advantage of providing security at the application layer in IoT? a) Simplifies trust management for intermediate nodes b) Ensures complete end-to-end security c) Reduces the need for hardware encryption d) Improves routing efficiency Answer: b) Ensures complete end-to-end security 29. Which property ensures that data cannot be tampered with during transmission? a) Confidentiality b) Integrity c) Availability d) Anonymity Answer: b) Integrity 30. What is the typical block size of the Tiny Encryption Algorithm (TEA)? a) 128 bits b) 64 bits c) 32 bits d) 256 bits Answer: b) 64 bits 31. What is a limitation of the traditional IPSec protocol in IoT scenarios? a) It lacks confidentiality features b) It uses computationally intensive algorithms c) It is incompatible with IPv6 d) It does not support authentication headers Answer: b) It uses computationally intensive algorithms 32. Which security protocol uses the Host Identity Protocol (HIP) namespace? a) IPSec b) DTLS c) CoAP d) HTTP Answer: a) IPSec 33. Which cryptographic method is based on modular exponentiation? a) RSA b) ECC c) AES d) TEA Answer: a) RSA 34. What is a significant drawback of using multicast communication in DTLS? a) Lack of encryption b) High computational power requirements c) No compatibility with multicast communication d) No support for large-scale deployment Answer: c) No compatibility with multicast communication 35. Which of the following is a symmetric-key cryptographic algorithm? a) RSA b) ECC c) TEA d) Diffie-Hellman Answer: c) TEA 36. What is the primary focus of lightweight cryptography for IoT? a) Increasing key lengths for higher security b) Balancing performance and resource constraints c) Reducing the need for authentication protocols d) Eliminating encryption overhead Answer: b) Balancing performance and resource constraints 37. Which algorithm uses substitution-permutation networks for encryption? a) RSA b) PRESENT c) ECC d) AES Answer: b) PRESENT 38. What is the primary concern when designing cryptographic hash functions for IoT? a) Increasing encryption speed b) Minimizing hardware and energy usage c) Adding additional key layers d) Improving large-scale packet delivery Answer: b) Minimizing hardware and energy usage 39. What is the primary use of homomorphic encryption in IoT? a) To allow operations on encrypted data without decryption b) To improve routing efficiency in IoT networks c) To replace RSA for key distribution d) To increase packet size for data transmission Answer: a) To allow 40. What is the main difference between partially and fully homomorphic encryption? a) Partially homomorphic encryption supports only addition, while fully supports only multiplication. b) Fully homomorphic encryption supports both addition and multiplication, while partially supports one of them. c) Partially homomorphic encryption uses symmetric keys, and fully uses asymmetric keys. d) Fully homomorphic encryption is faster than partially homomorphic encryption. Answer: b) Fully homomorphic encryption supports both addition and multiplication, while partially supports one of them. 41. What is the primary role of the Diffie-Hellman protocol in IoT? a) Encrypt data for long-term storage b) Facilitate secure key agreement c) Compress communication packets d) Secure multicast communications Answer: b) Facilitate secure key agreement 42. What is a critical feature of group-key distribution in IoT networks? a) It provides backward secrecy. b) It ensures forward secrecy. c) It manages cryptographic material updates. d) All of the above. Answer: d) All of the above. 43. What is one challenge of key management in IoT networks? a) Lack of lightweight cryptographic algorithms b) Securely distributing keys among constrained devices c) Replacing keys during secure bootstrapping d) Supporting IPv6 header compression Answer: b) Securely distributing keys among constrained devices 44. Which cryptographic primitive is most commonly used for message integrity verification? a) Hash functions b) Asymmetric encryption c) Stream ciphers d) Homomorphic encryption Answer: a) Hash functions 45. Which of the following is NOT a symmetric-key encryption method? a) TEA b) AES c) RSA d) PRESENT Answer: c) RSA 46. What makes the Elliptic Curve Cryptography (ECC) algorithm suitable for IoT? a) It uses shorter keys for the same security level as RSA. b) It eliminates the need for symmetric encryption. c) It is based on modular exponentiation. d) It is specifically designed for lightweight hardware. Answer: a) It uses shorter keys for the same security level as RSA. 47. What is the primary purpose of lightweight cryptographic hash functions like SPONGENT and PHOTON in IoT? a) To replace AES in constrained devices. b) To minimize hardware and energy consumption. c) To reduce computational power requirements for ECC. d) To handle large-scale encryption in data centers. Answer: b) To minimize hardware and energy consumption. 48. Why is CoAP preferred over HTTP in IoT? a) CoAP is designed to run over UDP, making it lightweight. b) CoAP provides better encryption than HTTP. c) CoAP eliminates the need for application-level protocols. d) CoAP supports IPv4 better than HTTP. Answer: a) CoAP is designed to run over UDP, making it lightweight. 49. What is the main advantage of using AES over lightweight ciphers in IoT? a) Lower power consumption b) Higher computational efficiency c) Established standard with strong security d) Compatibility with older IPv4 networks Answer: c) Established standard with strong security 50. Why is authorization a critical aspect of IoT security? a) To ensure only authorized entities can access sensitive data b) To enable faster communication between IoT devices c) To increase energy efficiency in constrained devices d) To reduce packet sizes in low-power networks Answer: a) To ensure only authorized entities can access sensitive data