protecting IoT devices
Qus. 1 : Identity the challenge coming under securing the information.
- Security
- Signaling
- Power Consumption
- Presence Detection
- time slice
- RMS
- cooperative multitasking
- pre-emptive
- Coulomb's Law
- Lenz's Law
- Fleming's Right-hand Rule
- Fleming's Left-hand Rule
- Simplex
- Duplex
- Full-Duplex
- None of these
- Mirai botnet
- cipher
- Ethernet
- Stuxnet
- A router
- A Firewall
- A Network Protocol
- Python Shell
- HTTPS
- SSL
- SMTP
- SFTP
- XMPP
- SPI
- MQTT
- HTTPS
- name of spouse
- Name of hobby
- Contains multiple random digit with special charactor
- None of the above
- Principle of least privilege
- Defence in depth
- Attack surface
- None of the above
- Confidentiality
- Integrity
- Availability
- None of these
- Confidentiality
- Integrity
- None of these
- Both of these
- Confidentiality
- Integrity
- Availability
- None of these
- Spam
- Injection
- Spoofing
- DoS attack
- Phishing
- Surfing
- DDoS
- Revealing
- Phishing
- Surfing
- Trojan horse
- Wamp
- Phishing
- Surfing
- Trojan horse
- Eavesdropping
- Darkmotel
- Mirai
- Petye
- whitehorse