Security and Future of IoT Ecosystem Set-2

Instruction:-

  • Number of Questions : 25
  • Total Marks : 25
  • Each question carry 1 Marks.
  • No negative marking

  •  

    Results

    #1. A botnet made of IoT devices is often used for:

    #2. Which standard is related to IoT security and privacy?

    #3. Which layer is responsible for data protection and policy enforcement?

    #4. A strong password should contain:

    #5. Which of these is a recommended IoT security practice?

    #6. The attack where a hacker intercepts and possibly alters communication is called:

    #7. IoT security must protect against threats to:

    #8. Security policies in IoT are defined at which layer?

    #9. An IoT device that is no longer updated by its manufacturer is called:

    #10. To ensure secure communication in IoT, devices must:

    #11. Which component processes data in the IoT ecosystem?

    #12. Which of the following best describes an actuator?

    #13. Which of these is NOT a communication protocol in IoT?

    #14. Which technology enables smart homes?

    #15. IoT devices use which of the following to sense surroundings?

    #16. Smart parking is an example of IoT in:

    #17. Which layer provides connectivity in IoT architecture?

    #18. IoT is mainly based on the concept of:

    #19. Which of the following is a wireless communication protocol?

    #20. oT devices usually need:

    #21. In an IoT system, cloud computing is mainly used for:

    #22. A smart thermostat is an example of:

    #23. Which technology helps IoT devices to operate with low power and wide range?

    #24. IoT devices must be designed to:

    #25. Which of the following is a popular IoT platform?

    Previous
    Finish

    Leave a Comment

    Your email address will not be published. Required fields are marked *