IoT Security & Trust_Quiz 1

IoT Security & Trust_Quiz 1

Professional Development

10 Qs

quiz-placeholder

Similar activities

DS - intro

DS - intro

Professional Development

15 Qs

CSF-PT05Q1

CSF-PT05Q1

Professional Development

15 Qs

Cybersecurity Core Functions

Cybersecurity Core Functions

Professional Development

15 Qs

WORKSHOP: HEALTHCARE DATA LAKEHOUSE IN ACTION

WORKSHOP: HEALTHCARE DATA LAKEHOUSE IN ACTION

Professional Development

10 Qs

Knowing the Cyber Threat

Knowing the Cyber Threat

Professional Development

6 Qs

DEAM (Quiz 1)

DEAM (Quiz 1)

Professional Development

11 Qs

Security Coding Quiz

Security Coding Quiz

Professional Development

14 Qs

Lesson 4 Ethics of AI

Lesson 4 Ethics of AI

Professional Development

10 Qs

IoT Security & Trust_Quiz 1

IoT Security & Trust_Quiz 1

Assessment

Quiz

Information Technology (IT)

Professional Development

Easy

Created by

DR 1142

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

1.What are the two main security attacks in IoT?

Active and Passive attacks

Phishing attacks and SQL injection
Ransomware attacks and Cross-Site Scripting
Credential stuffing and Session hijacking

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

2.Give the meaning for Access control?

Access control is a security measure that regulates who can view or use resources in a computing environment.
Access control is a type of software that enhances graphics performance.
Access control refers to the physical security of a building.
Access control is a method for increasing internet speed.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

3.Discuss the term Steganography?

Steganography is a method of encrypting data to make it unreadable.
Steganography involves the use of complex algorithms to secure data transmission.
Steganography is the process of compressing files to save space.
Steganography is the art of hiding information within other non-secret data.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

4.What is Cryptography?

Cryptography is the art of creating complex algorithms.
Cryptography is the study of ancient languages.
Cryptography is a method of data storage without security.
Cryptography is the science of securing information through encoding.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

5.List out the components of Cryptography.

Data encryption, backup systems, antivirus software, network security
User authentication, data compression, network protocols, firewalls
Hash functions, firewalls, VPNs, malware
Encryption algorithms, keys, protocols, digital signatures

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

6.If same key is used for encryption & decryption the algorithm is called _________

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

7.If different keys are used for encryption & decryption the algorithm is called __________.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?