Exam 23: Internet of Things Iot Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

the main elements of a RFID system are tags and readers.

(True/False)
4.8/5
(30)

__________ is designed for small embedded systems with tight requirements on memory, processing time, real-time response, and power consumption.

(Multiple Choice)
4.8/5
(49)

A key objective for Offset Codebook Mode is __________ .

(Multiple Choice)
4.9/5
(45)

the Iot is primarily driven by deeply embedded devices.

(True/False)
4.8/5
(33)

__________ is a characteristic of a system component that provides passive protection against an attack.

(Multiple Choice)
4.9/5
(39)

Developed by the NSA in the 1990s, __________ is one of the simplest and fastest block cipher algorithms.

(Short Answer)
4.8/5
(34)

the __________ generation is usually thought of as the Iot and is marked by the use of billions of embedded devices.

(Multiple Choice)
4.8/5
(28)

__________ is smartphones, tablets, and eBook readers bought as It devices by consumers exclusively using wireless connectivity and often multiple forms of wireless connectivity.

(Multiple Choice)
4.9/5
(36)

A __________ contains the electronics needed to transmit and receive dat

(Multiple Choice)
5.0/5
(43)

Iot is perhaps the most complex and undeveloped area of network security.

(True/False)
4.8/5
(40)

Fog computing and fog services are expected to be a distinguishing characteristic of the Iot.

(True/False)
4.8/5
(28)

Iot devices are typically constrained devices with limited memory, processing power, and power supply.

(True/False)
4.7/5
(37)

the __________ network provides storage and processing capabilities for the massive amounts of aggregated data that originate in Iot-enabled devices at the edge.

(Short Answer)
4.9/5
(35)

__________ is designed to be a link-level module that offers a high level of security, while simultaneiously keeping energy consumption low and using very little memory.

(Short Answer)
4.9/5
(37)

__________ is an unauthorized modification that alters the intended functioning of a system or device in a way that degrades the security it provides.

(Multiple Choice)
4.8/5
(39)

Personal technology is single-purpose devices bought by consumers, It, and Ot people exclusively using wireless connectivity, generally of a single form, as part of larger systems.

(True/False)
5.0/5
(37)

__________ is designed to meet these requirements: data authentication, confidentiality, replay protection, freshness, low energy overhead, and resilient to lost messages.

(Short Answer)
4.8/5
(39)

A key element in providing security in an Iot deployment is the gateway.

(True/False)
4.9/5
(42)

A __________ measures some parameter of a physical, chemical, or biological entity and delivers an electronic signal proportional to the observed characteristic, either in the form of an analog voltage level or a digital signal.

(Short Answer)
4.8/5
(39)

Both of the MiniSec operating mode schemes use OCB with a counter, known as a __________ , that is input along with the plaintext into the encryption algorithm.

(Short Answer)
4.8/5
(40)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)