Cryptography and Network Security

Computing

Quiz 23 :

Internet of Things Iot Security

Quiz 23 :

Internet of Things Iot Security

Question Type
search
arrow
A major characteristic of a good security program is how quickly the Iot system can be recovered after an incident has occurred.
Free
True False
Answer:

Answer:

True

Tags
Choose question tag
close menu
arrow
the __________ generation is usually thought of as the Iot and is marked by the use of billions of embedded devices.
Free
Multiple Choice
Answer:

Answer:

C

Tags
Choose question tag
close menu
arrow
the main elements of a RFID system are tags and readers.
Free
True False
Answer:

Answer:

True

Tags
Choose question tag
close menu
arrow
Iot is perhaps the most complex and undeveloped area of network security.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Offset Codebook Mode is approved as an authenticated encryption technique in the IEEE 802.11 wireless LAN standard.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the encryption structure for OCB is similar to that of ECB.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Iot devices are typically constrained devices with limited memory, processing power, and power supply.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Switches, sensors, and circuitry are mechanisms for tamper detection.
True False
Answer:
Tags
Choose question tag
close menu
arrow
MiniSec has two operating modes: unicast (MiniSec-U) and broadcast (MiniSec-B)
True False
Answer:
Tags
Choose question tag
close menu
arrow
__________ is PCs, servers, routers, and firewalls bought as It devices by enterprise It people, primarily using wired connectivity.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
Core servers also host the applications that interact with and manage the Iot devices and analyze the Iot-generated dat
True False
Answer:
Tags
Choose question tag
close menu
arrow
RFID __________ are small programmable devices used for object, animal, and human tracking.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
__________ is smartphones, tablets, and eBook readers bought as It devices by consumers exclusively using wireless connectivity and often multiple forms of wireless connectivity.
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
A __________ contains the electronics needed to transmit and receive dat
Multiple Choice
Answer:
Tags
Choose question tag
close menu
arrow
A key element in providing security in an Iot deployment is the gateway.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Iot is not required to support security audit for data transmission, storage, or processing.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the Iot is primarily driven by deeply embedded devices.
True False
Answer:
Tags
Choose question tag
close menu
arrow
the "smart" in a smart device is provided by a deeply embedded transceiver.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Personal technology is single-purpose devices bought by consumers, It, and Ot people exclusively using wireless connectivity, generally of a single form, as part of larger systems.
True False
Answer:
Tags
Choose question tag
close menu
arrow
Fog computing and fog services are expected to be a distinguishing characteristic of the Iot.
True False
Answer:
Tags
Choose question tag
close menu
Showing 1 - 20 of 45