Deck 23: Internet of Things Iot Security

Full screen (f)
exit full mode
Question
A major characteristic of a good security program is how quickly
the Iot system can be recovered after an incident has occurred.
Use Space or
up arrow
down arrow
to flip the card.
Question
the __________ generation is usually thought of as the Iot and is marked by the use of billions of embedded devices.

A)second
B)third
C)fourth
D)fifth
Question
the main elements of a RFID system are tags and readers.
Question
Iot is perhaps the most complex and undeveloped area of network
security.
Question
Offset Codebook Mode is approved as an authenticated
encryption technique in the IEEE 802.11 wireless LAN standard.
Question
the encryption structure for OCB is similar to that of ECB.
Question
Iot devices are typically constrained devices with limited memory,
processing power, and power supply.
Question
Switches, sensors, and circuitry are mechanisms for tamper
detection.
Question
MiniSec has two operating modes: unicast (MiniSec-U) and
broadcast (MiniSec-B)
Question
__________ is PCs, servers, routers, and firewalls bought as It devices by enterprise It people, primarily using wired connectivity.

A)Personal technology
B)Information technology
C)Operational technology
D)Sensor/actuator technology
Question
Core servers also host the applications that interact with and
manage the Iot devices and analyze the Iot-generated dat
Question
RFID __________ are small programmable devices used for object, animal, and human tracking.

A)tags
B)transceivers
C)readers
D)actuators
Question
__________ is smartphones, tablets, and eBook readers bought as It devices by consumers exclusively using wireless connectivity and often multiple forms of wireless connectivity.

A)Personal technology
B)Sensor/actuator technology
C)Information technology
D)Operational technology
Question
A __________ contains the electronics needed to transmit and receive dat A.sensor
B)power supply
C)microcontroller
D)transceiver
Question
A key element in providing security in an Iot deployment is the
gateway.
Question
Iot is not required to support security audit for data
transmission, storage, or processing.
Question
the Iot is primarily driven by deeply embedded devices.
Question
the "smart" in a smart device is provided by a deeply embedded
transceiver.
Question
Personal technology is single-purpose devices bought by
consumers, It, and Ot people exclusively using wireless connectivity, generally of a single form, as part of larger systems.
Question
Fog computing and fog services are expected to be a distinguishing
characteristic of the Iot.
Question
Secure, trusted, and privacy-protected __________ capability is required so that unauthorized access of the content of data can be prohibited, integrity of data can be guaranteed, and privacy-related content of data can be protected when storing or processing data in Iot.

A)data management
B)security audit
C)mutual authentication and authorization
D)communication
Question
__________ is a characteristic of a system component that provides passive protection against an attack.

A)tamper integration
B)tamper resistant
C)tampering
D)tamper detection
Question
__________ is designed to be a link-level module that offers a high level of security, while simultaneiously keeping energy consumption low and using very little memory.
Question
the __________ is a term that refers to the expanding interconnection of smart devices, ranging from appliances to tiny sensors.
Question
___________ is single-purpose devices bought by consumers, It, and Ot people exclusively using wireless connectivity, generally of a single forms.

A)Information technology
B)Operational technology
C)Personal technology
D)Sensor/actuator technology
Question
__________ is designed for small embedded systems with tight requirements on memory, processing time, real-time response, and power consumption.

A)RBAC
B)tinyOs
C)MiniSec
D)ECB
Question
Evaluation, formatting, expanding/decoding, distillation/reduction, and assessment are examples of __________ computing operations.
Question
the block cipher mode of operation chosen for MiniSec is __________ .

A)OCB
B)ECB
C)RBAC
D)OtC
Question
__________ is techniques to ensure that the overall system is made aware of unwanted physical access.

A)tamper resistant
B)tampering
C)tamper integration
D)tamper detection
Question
the __________ network provides storage and processing capabilities for the massive amounts of aggregated data that originate in Iot-enabled devices at the edge.
Question
the core network, also referred to as the __________ network, connects geographically dispersed fog networks as well as provides access to other networks that are not part of the enterprise network.
Question
A __________ interconnects the Iot-enabled devices with the higher-level communication networks.

A)sensor
B)gateway
C)reader
D)microcontroller
Question
A __________ measures some parameter of a physical, chemical, or biological entity and delivers an electronic signal proportional to the observed characteristic, either in the form of an analog voltage level or a digital signal.
Question
__________ technology is machines/appliances with embedded It built by non-It companies, such as medical machiners, SCADA, process control, and kiosks, bought as appliances by enterprise Ot people and primarily using wired connectivity.
Question
A(n) __________ receives an electronic signal from a controller and responds by interacting with its environment to produce an effect on some parameter of a physical, chemical, or biological entity.

A)power supply
B)microcontroller
C)actuator
D)sensor
Question
__________ is designed to meet these requirements: data authentication,
confidentiality, replay protection, freshness, low energy overhead, and resilient to lost messages.
Question
A key objective for Offset Codebook Mode is __________ .

A)security
B)compatibility
C)adaptability
D)efficiency
Question
the key components of an Iot-enabled device are: sensor, actuator, microcontroller, transceiver, and __________ .
Question
the main application of __________ is wireless sensor networks and it has become the de facto OS for such networks.
Question
__________ is an unauthorized modification that alters the intended functioning of a system or device in a way that degrades the security it provides.

A)tampering
B)tamper integration
C)tamper resistant
D)tamper detection
Question
Developed by the NSA in the 1990s, __________ is one of the simplest and
fastest block cipher algorithms.
Question
Mechanisms for ___________ include switches, sensors, and circuitry.
Question
typically, a __________ is a battery.
Question
Both of the MiniSec operating mode schemes use OCB with a counter,
known as a __________ , that is input along with the plaintext into the encryption algorithm.
Question
__________ systems assign access rights to roles instead of individual users.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 23: Internet of Things Iot Security
1
A major characteristic of a good security program is how quickly
the Iot system can be recovered after an incident has occurred.
True
2
the __________ generation is usually thought of as the Iot and is marked by the use of billions of embedded devices.

A)second
B)third
C)fourth
D)fifth
C
3
the main elements of a RFID system are tags and readers.
True
4
Iot is perhaps the most complex and undeveloped area of network
security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Offset Codebook Mode is approved as an authenticated
encryption technique in the IEEE 802.11 wireless LAN standard.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
the encryption structure for OCB is similar to that of ECB.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
Iot devices are typically constrained devices with limited memory,
processing power, and power supply.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Switches, sensors, and circuitry are mechanisms for tamper
detection.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
MiniSec has two operating modes: unicast (MiniSec-U) and
broadcast (MiniSec-B)
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
__________ is PCs, servers, routers, and firewalls bought as It devices by enterprise It people, primarily using wired connectivity.

A)Personal technology
B)Information technology
C)Operational technology
D)Sensor/actuator technology
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
Core servers also host the applications that interact with and
manage the Iot devices and analyze the Iot-generated dat
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
RFID __________ are small programmable devices used for object, animal, and human tracking.

A)tags
B)transceivers
C)readers
D)actuators
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
__________ is smartphones, tablets, and eBook readers bought as It devices by consumers exclusively using wireless connectivity and often multiple forms of wireless connectivity.

A)Personal technology
B)Sensor/actuator technology
C)Information technology
D)Operational technology
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
A __________ contains the electronics needed to transmit and receive dat A.sensor
B)power supply
C)microcontroller
D)transceiver
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
A key element in providing security in an Iot deployment is the
gateway.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
Iot is not required to support security audit for data
transmission, storage, or processing.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
the Iot is primarily driven by deeply embedded devices.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
the "smart" in a smart device is provided by a deeply embedded
transceiver.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
Personal technology is single-purpose devices bought by
consumers, It, and Ot people exclusively using wireless connectivity, generally of a single form, as part of larger systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
Fog computing and fog services are expected to be a distinguishing
characteristic of the Iot.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
Secure, trusted, and privacy-protected __________ capability is required so that unauthorized access of the content of data can be prohibited, integrity of data can be guaranteed, and privacy-related content of data can be protected when storing or processing data in Iot.

A)data management
B)security audit
C)mutual authentication and authorization
D)communication
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
__________ is a characteristic of a system component that provides passive protection against an attack.

A)tamper integration
B)tamper resistant
C)tampering
D)tamper detection
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
__________ is designed to be a link-level module that offers a high level of security, while simultaneiously keeping energy consumption low and using very little memory.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
the __________ is a term that refers to the expanding interconnection of smart devices, ranging from appliances to tiny sensors.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
___________ is single-purpose devices bought by consumers, It, and Ot people exclusively using wireless connectivity, generally of a single forms.

A)Information technology
B)Operational technology
C)Personal technology
D)Sensor/actuator technology
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
__________ is designed for small embedded systems with tight requirements on memory, processing time, real-time response, and power consumption.

A)RBAC
B)tinyOs
C)MiniSec
D)ECB
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
Evaluation, formatting, expanding/decoding, distillation/reduction, and assessment are examples of __________ computing operations.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
the block cipher mode of operation chosen for MiniSec is __________ .

A)OCB
B)ECB
C)RBAC
D)OtC
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
__________ is techniques to ensure that the overall system is made aware of unwanted physical access.

A)tamper resistant
B)tampering
C)tamper integration
D)tamper detection
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
the __________ network provides storage and processing capabilities for the massive amounts of aggregated data that originate in Iot-enabled devices at the edge.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
the core network, also referred to as the __________ network, connects geographically dispersed fog networks as well as provides access to other networks that are not part of the enterprise network.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
A __________ interconnects the Iot-enabled devices with the higher-level communication networks.

A)sensor
B)gateway
C)reader
D)microcontroller
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
A __________ measures some parameter of a physical, chemical, or biological entity and delivers an electronic signal proportional to the observed characteristic, either in the form of an analog voltage level or a digital signal.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
__________ technology is machines/appliances with embedded It built by non-It companies, such as medical machiners, SCADA, process control, and kiosks, bought as appliances by enterprise Ot people and primarily using wired connectivity.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
A(n) __________ receives an electronic signal from a controller and responds by interacting with its environment to produce an effect on some parameter of a physical, chemical, or biological entity.

A)power supply
B)microcontroller
C)actuator
D)sensor
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
__________ is designed to meet these requirements: data authentication,
confidentiality, replay protection, freshness, low energy overhead, and resilient to lost messages.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
A key objective for Offset Codebook Mode is __________ .

A)security
B)compatibility
C)adaptability
D)efficiency
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
the key components of an Iot-enabled device are: sensor, actuator, microcontroller, transceiver, and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
the main application of __________ is wireless sensor networks and it has become the de facto OS for such networks.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
__________ is an unauthorized modification that alters the intended functioning of a system or device in a way that degrades the security it provides.

A)tampering
B)tamper integration
C)tamper resistant
D)tamper detection
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
Developed by the NSA in the 1990s, __________ is one of the simplest and
fastest block cipher algorithms.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
Mechanisms for ___________ include switches, sensors, and circuitry.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
typically, a __________ is a battery.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
Both of the MiniSec operating mode schemes use OCB with a counter,
known as a __________ , that is input along with the plaintext into the encryption algorithm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
__________ systems assign access rights to roles instead of individual users.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.