0 of 10 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Which of the following is described below?
“Embedded software that contains a minimal operating system and related programs to control the IoT device”
Which of the following is a TCP/UDP vulnerability?
Match each of the following local application vulnerabilities to its description.
Username enumeration
|
|
Account lockout:
|
|
Weak passwords
|
|
Lack of multi-factor authentication:
|
|
Match each of the following cloud application vulnerabilities to its description.
Injection
|
|
XML external entities (XXE)
|
|
Sensitive data exposure
|
|
Which of the following is a vulnerability assessment type?
I. White Box
II. Grey Box
III. Black Box
Which of the following is described below:
The process of making something more secure. In this case, it is the IoT system with its different devices and layers.
Which of the following is described below?
A standardized protocol that allows the users of the internet to authenticate and authorize themselves without revealing their passwords.
Match each of the following terminologies to its correct definition.
Encryption
|
|
Encrypting
|
|
MQTT can be secured by securing the broker or the clients based on their capabilities.
Which of the following is a way to protect the messages?
I. TLS encryption
II. Payload encryption
Which of the following can be used to secure CoAP?