Instruction:-
#1. A botnet made of IoT devices is often used for:
#2. Which standard is related to IoT security and privacy?
#3. Which layer is responsible for data protection and policy enforcement?
#4. A strong password should contain:
#5. Which of these is a recommended IoT security practice?
#6. The attack where a hacker intercepts and possibly alters communication is called:
#7. IoT security must protect against threats to:
#8. Security policies in IoT are defined at which layer?
#9. An IoT device that is no longer updated by its manufacturer is called:
#10. To ensure secure communication in IoT, devices must:
#11. Which component processes data in the IoT ecosystem?
#12. Which of the following best describes an actuator?
#13. Which of these is NOT a communication protocol in IoT?
#14. Which technology enables smart homes?
#15. IoT devices use which of the following to sense surroundings?
#16. Smart parking is an example of IoT in:
#17. Which layer provides connectivity in IoT architecture?
#18. IoT is mainly based on the concept of:
#19. Which of the following is a wireless communication protocol?
#20. oT devices usually need:
#21. In an IoT system, cloud computing is mainly used for:
#22. A smart thermostat is an example of:
#23. Which technology helps IoT devices to operate with low power and wide range?
#24. IoT devices must be designed to:
#25. Which of the following is a popular IoT platform?
Previous
Finish