Exam 23: Internet of Things Iot Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

the key components of an Iot-enabled device are: sensor, actuator, microcontroller, transceiver, and __________ .

Free
(Short Answer)
4.8/5
(42)
Correct Answer:
Verified

power supply

Switches, sensors, and circuitry are mechanisms for tamper detection.

Free
(True/False)
4.9/5
(33)
Correct Answer:
Verified

True

typically, a __________ is a battery.

Free
(Short Answer)
4.8/5
(39)
Correct Answer:
Verified

power supply

__________ is techniques to ensure that the overall system is made aware of unwanted physical access.

(Multiple Choice)
4.8/5
(29)

Evaluation, formatting, expanding/decoding, distillation/reduction, and assessment are examples of __________ computing operations.

(Short Answer)
4.7/5
(27)

the encryption structure for OCB is similar to that of ECB.

(True/False)
4.8/5
(39)

the block cipher mode of operation chosen for MiniSec is __________ .

(Multiple Choice)
4.8/5
(39)

the __________ is a term that refers to the expanding interconnection of smart devices, ranging from appliances to tiny sensors.

(Short Answer)
4.7/5
(36)

A major characteristic of a good security program is how quickly the Iot system can be recovered after an incident has occurred.

(True/False)
4.9/5
(38)

Secure, trusted, and privacy-protected __________ capability is required so that unauthorized access of the content of data can be prohibited, integrity of data can be guaranteed, and privacy-related content of data can be protected when storing or processing data in Iot.

(Multiple Choice)
4.7/5
(30)

A(n) __________ receives an electronic signal from a controller and responds by interacting with its environment to produce an effect on some parameter of a physical, chemical, or biological entity.

(Multiple Choice)
4.8/5
(36)

Mechanisms for ___________ include switches, sensors, and circuitry.

(Short Answer)
5.0/5
(39)

___________ is single-purpose devices bought by consumers, It, and Ot people exclusively using wireless connectivity, generally of a single forms.

(Multiple Choice)
4.7/5
(39)

A __________ interconnects the Iot-enabled devices with the higher-level communication networks.

(Multiple Choice)
4.8/5
(29)

MiniSec has two operating modes: unicast (MiniSec-U) and broadcast (MiniSec-B)

(True/False)
4.9/5
(26)

Offset Codebook Mode is approved as an authenticated encryption technique in the IEEE 802.11 wireless LAN standard.

(True/False)
5.0/5
(31)

__________ is PCs, servers, routers, and firewalls bought as It devices by enterprise It people, primarily using wired connectivity.

(Multiple Choice)
4.8/5
(28)

__________ systems assign access rights to roles instead of individual users.

(Short Answer)
4.9/5
(34)

Iot is not required to support security audit for data transmission, storage, or processing.

(True/False)
4.9/5
(26)

__________ technology is machines/appliances with embedded It built by non-It companies, such as medical machiners, SCADA, process control, and kiosks, bought as appliances by enterprise Ot people and primarily using wired connectivity.

(Short Answer)
4.9/5
(39)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)