Security and Future of IoT ecosystem important MCQs in English/Hindi | Nielit Notes | PDF

In this post, we cover all important Questions from the topic "Security and Future of IoT ecosystem".

These MCQs will definitely help to pass IT and Computer students in any exam and interview that have Security and Future of IoT ecosystem topic.

Security and Future of IoT ecosystem chapter covers the following topics:

1. Need of security in IoT - Why Security? Privacy for IoT enabled devices- IoT

   security for consumer devices- Security levels, protecting IoT devices

2. Future IoT eco system - Need of power full core for building secure algorithms,

   Examples for new trends - AI, ML penetration to IoT

After completion of Security and Future of IoT ecosystem unit, Students will be able to understand: 

  • Need of security in IoT
  • Various basic concept of security
  • Security levels
  • Need of powerful CPU for Future IoT eco system


Security and Future of IoT ecosystem MCQs

Here are the 30 most important and frequently asked MCQs from the  "Security and Future of IoT ecosystem" topic.


1.Even with two-factor authentication, users may still be vulnerable to_____________attacks.

a. Scripting

b. Cross attack

c. Man-in-the-middle

d. Radiant

Ans.c. Man-in-the-middle

 

2.An encryption scheme is unconditionally secure if the ciphertext generated does not contain enough information to determine uniquely the corresponding plaintext, no matter how much cipher text is available.

a. True

b. False

Ans.a. True


3. Example of a good password is

a. name of a partner or spouse

b. word related to a job or hobby

c. words contains multiple random digits

d. name of a child or pet

Ans.c.


4. The DES algorithm has a key length of

a. 64 Bits

b. 128 Bits

c. 16 Bits

d. 32 Bits

Ans.a. 64 Bits


5. If the sender and receiver use different keys, the system is referred to as conventional cipher system.

a. True

b. False

Ans.b. False


6. In asymmetric key cryptography, the private key is kept by

a. Receiver

b. sender and receiver

c. Sender

d. all the connected devices to the network

Ans.a. Receiver


7. In cryptography, what is cipher?

a. none of the mentioned

b. encrypted message

c. both algorithm for performing encryption and decryption and encrypted message

d. algorithm for performing encryption and decryption

Ans.d.


8. A Web site that allows users to enter text, such as a comment or a name, and then stores it and later displays it to other users, is potentially vulnerable to a kind of attack called a ___________________ attack.

a. Cross-site scripting

b. Cross-site scoring scripting

c. Cross-site request forgery

d. Two-factor authentication

Ans.a.


9. AES uses a 128 bit block size and a key size of __________ bits.

a. 128 or 192

b. 128 or 256

c. 128, 192, or 256

d. 128, 192, or 256

Ans.d. 


10. All of following are biometric techniques except

a. Badge

b. Retina

c. Face

d. Palm print

Ans.d. Palm print


11. In dealing with the risk, which response is done by buying insurance

a. Risk acceptance

b. Risk mitigation

c. Risk transfer

d. Risk avoidance

Ans.c.


12. Most devastating loss to a company is

a. Loss of printouts

b. Loss of data

c. Loss of Hardware

d. Loss of software

Ans.b. Loss of data


13. _________ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

a. Cross-site scoring scripting

b. Cross-site request forgery

c. Two-factor authentication

d. Cross-site scripting

Ans.b.


14. In DREAD methodology of risk analysis in threat analysis, how is the Risk score for each threat is calculated

a. Risk score = (Reproducibility + Exploitability + Discoverability) * (Damage potential + Affected users)

b. Risk score = (Reproducibility * Exploitability * Discoverability) / (Damage potential * Affected users)

c. Risk score = (Reproducibility + Exploitability + Discoverability) / (Damage potential + Affected users)

d. Risk score = (Reproducibility * Exploitability - Discoverability) ^ (Damage potential + Affected users)

Ans.a.


15. Which of the following is the future application of IoT?

A. role of green iot system

B. qos in communication

C. secure communication

D. multimedia communication

Ans. a


16. In threat modeling, what methodology used to perform risk analysis

a. DREAD

b. OWASP

c. STRIDE

d. DAR

Ans.a. DREAD


17. Many applications use _________________, where two independent factors are used to identify a user.

a. Cross-site request forgery

b. Cross-site scoring scripting

c. Two-factor authentication

d. Cross-site scripting

Ans.c. 


18. Which of the following is not a response when dealing with a risk?

a. Mitigation

b. Avoidance

c. Transfer

d. Patching

Ans.d


19. Why threat modelling is not performed

a. Secure Application building

b. Performing data analytics

c. Achieving Defense in Depth

d. To save time, revenue and reputation of a company

Ans.b.


20. You are asked to develop application from scratch, when will you start performing threat modeling of the application

a. During requirements collection phase

b. At the design stage

c. At the beginning of the testing phase

Ans.a.


21. Which of the following is not a type of cloud deployment

a. Private

b. Public

c. Hybrid

d. Social

Ans.d


22. Which of the following is not the part of basic services offered by cloud

a. PaaS

b. SaaS

c. IaaS

d. LaaS

Ans.d


23. Which of the following is not the part of IoT Ecosystem

a. Edge Device

b. Public cloud

c. None of them

d. Mobile App

e. Router

Ans.c


24. Which of the following is threat to IoT Device

a. Virus

b. All of the above

c. People

d. Natural Disaster

e. Spoofing

Ans.b


25. Which of the following makes sure that data is not changed when it not supposed to be?

a. Integrity

b. Availability

c. Confidentiality

d. Accounting

Ans.a


26. Which of the following is not a type or source of threat

a. Operational threat

b. Cultural threat

c. Technical threat

d. Social threat

Ans.b


27. Which of the following is not the component of IoT Endpoint

a. Sensor

b. Gateway

c. Communication Module

d. MCU

Ans.b


28. Which of the following terms indicates that information is to be read only by those people for whom it is intended?

a. Availability

b. Accounting

c. Integrity

d. Confidentiality

Ans.d


29. Which one is not part of CIA Triad

a. Authorisation

b. Authenticity

c. Integrity

d. Confidentiality

Ans.b


30. Which one is not the component of IoT Security Architecture

a. None of them

b. Secure Device

c. Secure Lifecycle Management

d. Secure Communication

e. Secure Cloud

Ans.a

No comments:

Powered by Blogger.