Answer : B
Explain : Botnets are often used to launch Distributed Denial of Service (DDoS) attacks. In a DDoS attack, a large number of compromised devices, often referred to as "bots" or "zombies," are coordinated by a central controller to flood a target server or network with a massive amount of traffic, overwhelming its capacity and causing it to become unavailable to legitimate users
The IIoT stands for
Indepth Internet of T
Innovative Internet of Things
Industrial Internet of Things
Information Internet of Things
Answer : C
Explain : IIoT stands for Industrial Internet of Things. It's a subset of the Internet of Things (IoT) that uses smart devices to enhance manufacturing and industrial processes.
IIoT targets applications related to
Health and fitness.
Entertainment
Both of these
None of these
Answer : C
Explain : IoT (Internet of Things) targets a wide range of applications related to various industries and sectors. Some of these- Smart Home, Healthcare, Agriculture, Transportation, Manufacturing, Smart Cities etx.
________ is flooding the Internet with many copies of same message (typically email)
Spam
Injection
Spoofing
DoS attack
Answer : A
Explain : The term for flooding the Internet with many copies of the same message, typically through email, is known as "spamming." The unsolicited and often irrelevant or inappropriate messages are sent in bulk to a large number of recipients. Spamming is generally associated with various forms of unwanted communication, including advertisements, scams, and phishing attempts.
______________is a type of social engineering where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information
Phishing
Surfing
DDoS
Revealing
Answer : A
Explain : A phishing attack is a type of online fraud that uses fraudulent communications to trick people into sharing sensitive information or downloading malware. Phishing attacks can be done through: Emails, Text messages, Phone calls, Websites, Social media.
. ______________is a program which enters computer system by secretly attaching itself with valid computer program and later steals information.
Phishing
Surfing
Trojan horse
Wamp
Answer : C
Explain : A Trojan horse is a type of malware that disguises itself as a legitimate or useful program, but it contains malicious code that can perform various actions, including stealing information, damaging files, or providing unauthorized access to the infected computer
______ is the act of secretly listening to the private conversation or communications of others without their consent in order to gather information.
Phishing
Surfing
Trojan horse
Eavesdropping
Answer : D
Explain : Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information.
_____________ malware is designed to launch botnet attack, primarily targeting online consumer devices such as IP cameras and home routers
Darkmotel
Mirai
Petye
whitehorse
Answer : B
Explain : Mirai is malware that infects smart devices that run on ARC processors, turning them into a network of remotely controlled bots or "zombies". This network of bots, called a botnet, is often used to launch DDoS attacks.
IoT devices are vulnerable to attacks and threats. One of them is Cryptanalysis attack that means:
By recovering the encryption information
Inject malicious codes
Find ciphertext to break the encryption
Tamper with the hardware
Answer : C
Explain : Cryptanalysis is the process of decrypting and analyzing codes, ciphers, or encrypted text. It's also known as code-cracking.
The future IoT trust infrastructures are based on __________technology for business-critical interaction between devices without direct human interaction.
XML
.Net
Blockchain
Blockchain
Answer : C
Explain : A blockchain is a digital ledger that records transactions across a network of computers. It's a decentralized, distributed, and often public database
Which of the following is NOT a key concern in the security of IoT devices ?
Data privacy
Authentication
Device interoperability
Firmware updates
Answer : C
Explain : Interoperability in the Internet of Things (IoT) is the ability for different devices, applications, and platforms to exchange and interpret data. It ensures that devices from different manufacturers can work together effectively, enabling users to create comprehensive and interconnected systems.
What is the primary purpose of IoT device authentication ?
To improve device aesthetics
To enhance battery life
To ensure device security and trustworthiness
To reduce device cost
Answer : C
What is Blockchain ?
A distributed ledger on a peer to peer network
A type of cryptocurrency
An exchange
A centralized ledger
Answer : A
Explain : Blockchain is a digital database or ledger that is distributed among the nodes of a peer to peer network. A blockchain is a digital ledger that stores records called blocks. These blocks are linked using cryptography. Each block contains: A cryptographic hash of the previous block, A timestamp, Transaction data.
Which of the following is not an element of threat modelling?
Asset
Vulnerability
Threat
Time
Answer : D
Explain : Threat modeling is a process that uses hypothetical scenarios, system diagrams, and testing to help secure systems and data.
In a dictionary attack, what is the "dictionary" composed of ?
A list of common encryption keys
A collection of words, phrases, or character combinations
A set of decryption algorithms
A list of usernames and their corresponding passwords
Answer : B
Explain : A dictionary attack is a type of brute force attack that uses a dictionary list of common words and phrases to crack a password-protected security system. The attacker systematically enters every word in the dictionary as a password.