Instruction:-
#1. Which of the following is a common security issue in IoT devices?
#2. The process of converting data into a code to prevent unauthorized access is called:
#3. Which protocol is commonly used to secure IoT communications?
#4. Which of the following is a device authentication method in IoT security?
#5. Which term refers to the ability of an IoT system to resist attacks and recover quickly?
#6. Which of the following is NOT a layer in the IoT architecture?
#7. Which layer of IoT architecture handles sensors and data collection?
#8. In the IoT ecosystem, what is the role of the gateway?
#9. Which of these is a feature of IoT?
#10. IoT devices usually use which kind of IP addressing?
#11. What does “DoS” in cybersecurity stand for?
#12. Which of the following helps ensure data integrity in IoT communication?
#13. In IoT, which mechanism protects against replay attacks?
#14. Firmware updates in IoT devices are important because they:
#15. Which of the following is a best practice for IoT device security?
#16. What is the role of the application layer in IoT?
#17. Which communication protocol is lightweight and suitable for IoT devices?
#18. Which of the following is an example of an IoT application?
#19. Which of the following is a characteristic of IoT?
#20. Which device is commonly used in IoT to collect environmental data?
#21. Which of the following is a common attack on IoT devices?
#22. What is the purpose of access control in IoT?
#23. Which technology can improve IoT security using unique identity verification?
#24. What does “End-to-End Encryption” ensure?
#25. Which of these is not a security principle in IoT?
Previous
Finish