IoT security for consumer devices

Qus. 1 : IoT security management includes ________

  1. Protocol abstraction
  2. Simple and fast installation
  3. Security with hardware
  4. Data storage
Qus. 2 : Which one is not an element of IoT

  1. Security
  2. Process
  3. People
  4. Things
Qus. 3 : Which of the following is used for risk analysis?

  1. DREAD
  2. OWASP
  3. STRIDE
  4. DAR
Qus. 4 : Which of the following challenge arises when we use many devices on the same network?

  1. Signaling
  2. Security
  3. Power Detection
  4. Power Consunmption
Qus. 5 : While presenting using projectors, information line can be revealed by using an__________sheet to over the

  1. Transparent, slide
  2. Translucent, transparency
  3. Opaque, flip chart
  4. Opaque, transparency
Qus. 6 : Which of the following process is used to keep track of user's activity

  1. Authentication
  2. Authoring
  3. Authorization
  4. Accounting
Qus. 7 : The main objective of WoT (Web of Things) is

  1. Improve usability and interoperability
  2. Reduce the security
  3. Complicate the development
  4. Increase the cost
Qus. 8 : Who will use their own for business models

  1. Service provider
  2. SaaS
  3. IaaS
  4. None
Qus. 9 : The different type of communication models available in an IoT ecosystem typically fall in following category/categories

  1. Request-response model
  2. Push-pull model
  3. Publish-subscribe model
  4. All of these
Qus. 10 : <p>Match the following Internet security threats with their definitions.</p><table class="table table-bordered"><tbody><tr><td><span style="font-size: 14px;"><b>Threat</b></span></td><td><span style="font-size: 14px;"><b>Definition</b></span></td></tr><tr><td><span style="font-size: 14px;">A. Phishing</span></td><td><span style="font-size: 14px;">1. Overwhelms a target server by flooding it with excessive traffic</span></td></tr><tr><td><span style="font-size: 14px;">B. Malware</span></td><td><span style="font-size: 14px;">2. Secretly gathers user information without consent</span></td></tr><tr><td><span style="font-size: 14px;">C. DDoS Attack</span></td><td><span style="font-size: 14px;">3. Software designed to damage or disrupt a computer system</span></td></tr><tr><td><span style="font-size: 14px;">D. Spyware</span></td><td><span style="font-size: 14px;">4. Fraudulent attempt to obtain sensitive information through fake emails or websites</span></td></tr></tbody></table><p><br></p>

  1. A-1, B-2, C-3, D-4
  2. A-4, B-3, C-1, D-2
  3. A-3, B-4, C-2, D-1
  4. A-2, B-1, C-4, D-3
Qus. 11 : <p>Match the cryptographic attacks with their definitions.</p><p><br></p><table class="table table-bordered"><tbody><tr><td><b>Attack Type</b></td><td><b>Definition</b></td></tr><tr><td>1<span style="white-space:pre"> </span>Brute Force Attack</td><td>A<span style="white-space:pre"> </span>Reusing captured data to gain unauthorized access</td></tr><tr><td>2<span style="white-space:pre"> </span>Man-in-the-Middle Attack</td><td>B<span style="white-space:pre"> </span>Intercepting and modifying communication</td></tr><tr><td>3<span style="white-space:pre"> </span>Dictionary Attack</td><td>C<span style="white-space:pre"> </span>Using a predefined list of passwords to guess credentials</td></tr><tr><td>4<span style="white-space:pre"> </span>Replay Attack</td><td>D<span style="white-space:pre"> </span>Attacker tries every possible key</td></tr></tbody></table><p><br></p>

  1. 1 → D, 2 → B, 3 → C, 4 →A
  2. 1 → C, 2 → A, 3 → B, 4 → D
  3. 1 → B, 2 → D, 3 → A, 4 → C
  4. 1 → A, 2 → D, 3 → B, 4 → C

Programs

Latest Current Affairs 2025 Online Exam Quiz for One day Exam Online Typing Test CCC Online Test Python Programming Tutorials Best Computer Training Institute in Prayagraj (Allahabad) Online MBA 2 years Online MCA Online BCA Best Website and Software Company in Allahabad