Internet of Things and its Applications

Security and Future of IoT Ecosystem

  1. Botnet is often used to launch ___________ attack
    1. DoS
    2. DDoS
    3. Brute force
    4. Passive
    Answer : B
    Explain : Botnets are often used to launch Distributed Denial of Service (DDoS) attacks. In a DDoS attack, a large number of compromised devices, often referred to as "bots" or "zombies," are coordinated by a central controller to flood a target server or network with a massive amount of traffic, overwhelming its capacity and causing it to become unavailable to legitimate users
  2. The IIoT stands for
    1. Indepth Internet of T
    2. Innovative Internet of Things
    3. Industrial Internet of Things
    4. Information Internet of Things
    Answer : C
    Explain : IIoT stands for Industrial Internet of Things. It's a subset of the Internet of Things (IoT) that uses smart devices to enhance manufacturing and industrial processes.
  3. IIoT targets applications related to
    1. Health and fitness.
    2. Entertainment
    3. Both of these
    4. None of these
    Answer : C
    Explain : IoT (Internet of Things) targets a wide range of applications related to various industries and sectors. Some of these- Smart Home, Healthcare, Agriculture, Transportation, Manufacturing, Smart Cities etx.
  4. ________ is flooding the Internet with many copies of same message (typically email)
    1. Spam
    2. Injection
    3. Spoofing
    4. DoS attack
    Answer : A
    Explain : The term for flooding the Internet with many copies of the same message, typically through email, is known as "spamming." The unsolicited and often irrelevant or inappropriate messages are sent in bulk to a large number of recipients. Spamming is generally associated with various forms of unwanted communication, including advertisements, scams, and phishing attempts.
  5. ______________is a type of social engineering where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information
    1. Phishing
    2. Surfing
    3. DDoS
    4. Revealing
    Answer : A
    Explain : A phishing attack is a type of online fraud that uses fraudulent communications to trick people into sharing sensitive information or downloading malware. Phishing attacks can be done through: Emails, Text messages, Phone calls, Websites, Social media.
  6. . ______________is a program which enters computer system by secretly attaching itself with valid computer program and later steals information.
    1. Phishing
    2. Surfing
    3. Trojan horse
    4. Wamp
    Answer : C
    Explain : A Trojan horse is a type of malware that disguises itself as a legitimate or useful program, but it contains malicious code that can perform various actions, including stealing information, damaging files, or providing unauthorized access to the infected computer
  7. ______ is the act of secretly listening to the private conversation or communications of others without their consent in order to gather information.
    1. Phishing
    2. Surfing
    3. Trojan horse
    4. Eavesdropping
    Answer : D
    Explain : Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information.
  8. _____________ malware is designed to launch botnet attack, primarily targeting online consumer devices such as IP cameras and home routers
    1. Darkmotel
    2. Mirai
    3. Petye
    4. whitehorse
    Answer : B
    Explain : Mirai is malware that infects smart devices that run on ARC processors, turning them into a network of remotely controlled bots or "zombies". This network of bots, called a botnet, is often used to launch DDoS attacks.
  9. IoT devices are vulnerable to attacks and threats. One of them is Cryptanalysis attack that means:
    1. By recovering the encryption information
    2. Inject malicious codes
    3. Find ciphertext to break the encryption
    4. Tamper with the hardware
    Answer : C
    Explain : Cryptanalysis is the process of decrypting and analyzing codes, ciphers, or encrypted text. It's also known as code-cracking.
  10. The future IoT trust infrastructures are based on __________technology for business-critical interaction between devices without direct human interaction.
    1. XML
    2. .Net
    3. Blockchain
    4. Blockchain
    Answer : C
    Explain : A blockchain is a digital ledger that records transactions across a network of computers. It's a decentralized, distributed, and often public database
  11. Which of the following is NOT a key concern in the security of IoT devices ?
    1. Data privacy
    2. Authentication
    3. Device interoperability
    4. Firmware updates
    Answer : C
    Explain : Interoperability in the Internet of Things (IoT) is the ability for different devices, applications, and platforms to exchange and interpret data. It ensures that devices from different manufacturers can work together effectively, enabling users to create comprehensive and interconnected systems.
  12. What is the primary purpose of IoT device authentication ?
    1. To improve device aesthetics
    2. To enhance battery life
    3. To ensure device security and trustworthiness
    4. To reduce device cost
    Answer : C
  13. What is Blockchain ?
    1. A distributed ledger on a peer to peer network
    2. A type of cryptocurrency
    3. An exchange
    4. A centralized ledger
    Answer : A
    Explain : Blockchain is a digital database or ledger that is distributed among the nodes of a peer to peer network. A blockchain is a digital ledger that stores records called blocks. These blocks are linked using cryptography. Each block contains: A cryptographic hash of the previous block, A timestamp, Transaction data.
  14. Which of the following is not an element of threat modelling?
    1. Asset
    2. Vulnerability
    3. Threat
    4. Time
    Answer : D
    Explain : Threat modeling is a process that uses hypothetical scenarios, system diagrams, and testing to help secure systems and data.
  15. In a dictionary attack, what is the "dictionary" composed of ?
    1. A list of common encryption keys
    2. A collection of words, phrases, or character combinations
    3. A set of decryption algorithms
    4. A list of usernames and their corresponding passwords
    Answer : B
    Explain : A dictionary attack is a type of brute force attack that uses a dictionary list of common words and phrases to crack a password-protected security system. The attacker systematically enters every word in the dictionary as a password.

Next Set