IOT SECURITY 1st

IOT SECURITY 1st

12th Grade

21 Qs

quiz-placeholder

Similar activities

Internet of Things

Internet of Things

2nd - 12th Grade

20 Qs

Keamanan Jaringan Test

Keamanan Jaringan Test

11th Grade - University

25 Qs

TeachCyber Unit 2 Review - Risk, Adversity, and Trust

TeachCyber Unit 2 Review - Risk, Adversity, and Trust

9th - 12th Grade

16 Qs

Practice for 8th AP CSP quiz

Practice for 8th AP CSP quiz

10th - 12th Grade

20 Qs

Security

Security

12th Grade - Professional Development

24 Qs

039_Zero-day Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

039_Zero-day Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

9th - 12th Grade

20 Qs

B.2.2 Practice Test

B.2.2 Practice Test

9th - 12th Grade

20 Qs

Unit 11 Assessing Vulnerabilities

Unit 11 Assessing Vulnerabilities

12th Grade

20 Qs

IOT SECURITY 1st

IOT SECURITY 1st

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Jeannette Rojas

Used 20+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What process is used by blockchain technology to validate transactions?

  • scope of work

  • digital signatures

  • synchronous key encryption

  • proof of work

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which programming language is an example of an interpreted language?

  • C#

  • Java

Python

  • C

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which DFD symbol represents data output from sensing, actuating, traffic forwarding, analysis, and control systems?

  • external entity

  • data flow

  • data store

process

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are three items that should be included in the documentation describing the components of the IoT system at each layer? (Choose three.)

applications

devices

communications network

  • protocols

  • technologies

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework by NIST, which work role in the risk management specialty area conducts comprehensive assessments of the management, operational, and technical security controls to determine their overall effectiveness?

  • Security Architect

  • Security Control Assessor

  • Vulnerability Assessment Analyst

  • Secure Software Assessor

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor has used malicious commands to trick the database into returning unauthorized records and other data. Which web front-end vulnerability is the threat actor exploiting?

  • cross-site scripting

  • broken authentication

  • security misconfiguration

SQL injections

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework by NIST, which work role in the Vulnerability Assessment and Management specialty area performs assessments of IT systems and identifies where those systems deviate from acceptable configurations or policy?

Vulnerabiliry Assessment Analyst

  • Secure Software Assessor

  • Security Architect

  • Security Control Assessor

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?