protecting IoT devices

Qus. 1 : Identity the challenge coming under securing the information.

  1. Security
  2. Signaling
  3. Power Consumption
  4. Presence Detection
Qus. 2 : Which of the following method is better for task swapping in the embedded systems

  1. time slice
  2. RMS
  3. cooperative multitasking
  4. pre-emptive
Qus. 3 : Which rule is used to decide the direction of rotation of DC motor

  1. Coulomb's Law
  2. Lenz's Law
  3. Fleming's Right-hand Rule
  4. Fleming's Left-hand Rule
Qus. 4 : HC-05 is a Bluetooth module that can communicate in which mode ?

  1. Simplex
  2. Duplex
  3. Full-Duplex
  4. None of these
Qus. 5 : The hack, is one of the most famous IOT security attack.

  1. Mirai botnet
  2. cipher
  3. Ethernet
  4. Stuxnet
Qus. 6 : What is Secure Shell (SSH)?

  1. A router
  2. A Firewall
  3. A Network Protocol
  4. Python Shell
Qus. 7 : Which of the following is not a strong security protocol?

  1. HTTPS
  2. SSL
  3. SMTP
  4. SFTP
Qus. 8 : Which of the following protocols does the secure digital card application use?

  1. XMPP
  2. SPI
  3. MQTT
  4. HTTPS
Qus. 9 : Which of the following is a good password example.

  1. name of spouse
  2. Name of hobby
  3. Contains multiple random digit with special charactor
  4. None of the above
Qus. 10 : What do you call the scope that hacker can use to break into a system

  1. Principle of least privilege
  2. Defence in depth
  3. Attack surface
  4. None of the above
Qus. 11 : ___________ is the assurance that the information is trustworthy and accurate

  1. Confidentiality
  2. Integrity
  3. Availability
  4. None of these
Qus. 12 : A set of rules that limits access to information is known as

  1. Confidentiality
  2. Integrity
  3. None of these
  4. Both of these
Qus. 13 : _________ is the guarantee of reliable and constant access to your sensitive data by authorized data

  1. Confidentiality
  2. Integrity
  3. Availability
  4. None of these
Qus. 14 : _______ is flooding the Internet with many copies of same message (typically email)

  1. Spam
  2. Injection
  3. Spoofing
  4. DoS attack
Qus. 15 : ______________is a type of social engineering where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information

  1. Phishing
  2. Surfing
  3. DDoS
  4. Revealing
Qus. 16 : ______________is a program which enters computer system by secretly attaching itself with valid computer program and later steals information.

  1. Phishing
  2. Surfing
  3. Trojan horse
  4. Wamp
Qus. 17 : ______ is the act of secretly listening to the private conversation or communications of others without their consent in order to gather information.

  1. Phishing
  2. Surfing
  3. Trojan horse
  4. Eavesdropping
Qus. 18 : ____________ malware is designed to launch botnet attack, primarily targeting online consumer devices such as IP cameras and home routers

  1. Darkmotel
  2. Mirai
  3. Petye
  4. whitehorse

Programs

Latest Current Affairs 2024 Online Exam Quiz for One day Exam Online Typing Test CCC Online Test Python Programming Tutorials Best Computer Training Institute in Prayagraj (Allahabad) Online MBA 2 years Online MCA Online BCA Best Website and Software Company in Allahabad