Deck 23: Internet of Things Iot Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 23: Internet of Things Iot Security
1
A major characteristic of a good security program is how quickly
the Iot system can be recovered after an incident has occurred.
the Iot system can be recovered after an incident has occurred.
True
2
the __________ generation is usually thought of as the Iot and is marked by the use of billions of embedded devices.
A)second
B)third
C)fourth
D)fifth
A)second
B)third
C)fourth
D)fifth
C
3
the main elements of a RFID system are tags and readers.
True
4
Iot is perhaps the most complex and undeveloped area of network
security.
security.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Offset Codebook Mode is approved as an authenticated
encryption technique in the IEEE 802.11 wireless LAN standard.
encryption technique in the IEEE 802.11 wireless LAN standard.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
the encryption structure for OCB is similar to that of ECB.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
Iot devices are typically constrained devices with limited memory,
processing power, and power supply.
processing power, and power supply.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Switches, sensors, and circuitry are mechanisms for tamper
detection.
detection.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
MiniSec has two operating modes: unicast (MiniSec-U) and
broadcast (MiniSec-B)
broadcast (MiniSec-B)
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
__________ is PCs, servers, routers, and firewalls bought as It devices by enterprise It people, primarily using wired connectivity.
A)Personal technology
B)Information technology
C)Operational technology
D)Sensor/actuator technology
A)Personal technology
B)Information technology
C)Operational technology
D)Sensor/actuator technology
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
Core servers also host the applications that interact with and
manage the Iot devices and analyze the Iot-generated dat
manage the Iot devices and analyze the Iot-generated dat
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
RFID __________ are small programmable devices used for object, animal, and human tracking.
A)tags
B)transceivers
C)readers
D)actuators
A)tags
B)transceivers
C)readers
D)actuators
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
__________ is smartphones, tablets, and eBook readers bought as It devices by consumers exclusively using wireless connectivity and often multiple forms of wireless connectivity.
A)Personal technology
B)Sensor/actuator technology
C)Information technology
D)Operational technology
A)Personal technology
B)Sensor/actuator technology
C)Information technology
D)Operational technology
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
A __________ contains the electronics needed to transmit and receive dat A.sensor
B)power supply
C)microcontroller
D)transceiver
B)power supply
C)microcontroller
D)transceiver
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
A key element in providing security in an Iot deployment is the
gateway.
gateway.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
Iot is not required to support security audit for data
transmission, storage, or processing.
transmission, storage, or processing.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
the Iot is primarily driven by deeply embedded devices.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
the "smart" in a smart device is provided by a deeply embedded
transceiver.
transceiver.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
Personal technology is single-purpose devices bought by
consumers, It, and Ot people exclusively using wireless connectivity, generally of a single form, as part of larger systems.
consumers, It, and Ot people exclusively using wireless connectivity, generally of a single form, as part of larger systems.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
Fog computing and fog services are expected to be a distinguishing
characteristic of the Iot.
characteristic of the Iot.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
Secure, trusted, and privacy-protected __________ capability is required so that unauthorized access of the content of data can be prohibited, integrity of data can be guaranteed, and privacy-related content of data can be protected when storing or processing data in Iot.
A)data management
B)security audit
C)mutual authentication and authorization
D)communication
A)data management
B)security audit
C)mutual authentication and authorization
D)communication
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
__________ is a characteristic of a system component that provides passive protection against an attack.
A)tamper integration
B)tamper resistant
C)tampering
D)tamper detection
A)tamper integration
B)tamper resistant
C)tampering
D)tamper detection
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
__________ is designed to be a link-level module that offers a high level of security, while simultaneiously keeping energy consumption low and using very little memory.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
the __________ is a term that refers to the expanding interconnection of smart devices, ranging from appliances to tiny sensors.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
___________ is single-purpose devices bought by consumers, It, and Ot people exclusively using wireless connectivity, generally of a single forms.
A)Information technology
B)Operational technology
C)Personal technology
D)Sensor/actuator technology
A)Information technology
B)Operational technology
C)Personal technology
D)Sensor/actuator technology
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
__________ is designed for small embedded systems with tight requirements on memory, processing time, real-time response, and power consumption.
A)RBAC
B)tinyOs
C)MiniSec
D)ECB
A)RBAC
B)tinyOs
C)MiniSec
D)ECB
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
Evaluation, formatting, expanding/decoding, distillation/reduction, and assessment are examples of __________ computing operations.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
the block cipher mode of operation chosen for MiniSec is __________ .
A)OCB
B)ECB
C)RBAC
D)OtC
A)OCB
B)ECB
C)RBAC
D)OtC
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
__________ is techniques to ensure that the overall system is made aware of unwanted physical access.
A)tamper resistant
B)tampering
C)tamper integration
D)tamper detection
A)tamper resistant
B)tampering
C)tamper integration
D)tamper detection
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
the __________ network provides storage and processing capabilities for the massive amounts of aggregated data that originate in Iot-enabled devices at the edge.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
the core network, also referred to as the __________ network, connects geographically dispersed fog networks as well as provides access to other networks that are not part of the enterprise network.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
A __________ interconnects the Iot-enabled devices with the higher-level communication networks.
A)sensor
B)gateway
C)reader
D)microcontroller
A)sensor
B)gateway
C)reader
D)microcontroller
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
A __________ measures some parameter of a physical, chemical, or biological entity and delivers an electronic signal proportional to the observed characteristic, either in the form of an analog voltage level or a digital signal.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
__________ technology is machines/appliances with embedded It built by non-It companies, such as medical machiners, SCADA, process control, and kiosks, bought as appliances by enterprise Ot people and primarily using wired connectivity.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
A(n) __________ receives an electronic signal from a controller and responds by interacting with its environment to produce an effect on some parameter of a physical, chemical, or biological entity.
A)power supply
B)microcontroller
C)actuator
D)sensor
A)power supply
B)microcontroller
C)actuator
D)sensor
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
__________ is designed to meet these requirements: data authentication,
confidentiality, replay protection, freshness, low energy overhead, and resilient to lost messages.
confidentiality, replay protection, freshness, low energy overhead, and resilient to lost messages.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
A key objective for Offset Codebook Mode is __________ .
A)security
B)compatibility
C)adaptability
D)efficiency
A)security
B)compatibility
C)adaptability
D)efficiency
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
the key components of an Iot-enabled device are: sensor, actuator, microcontroller, transceiver, and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
the main application of __________ is wireless sensor networks and it has become the de facto OS for such networks.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
__________ is an unauthorized modification that alters the intended functioning of a system or device in a way that degrades the security it provides.
A)tampering
B)tamper integration
C)tamper resistant
D)tamper detection
A)tampering
B)tamper integration
C)tamper resistant
D)tamper detection
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
Developed by the NSA in the 1990s, __________ is one of the simplest and
fastest block cipher algorithms.
fastest block cipher algorithms.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
Mechanisms for ___________ include switches, sensors, and circuitry.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
typically, a __________ is a battery.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
Both of the MiniSec operating mode schemes use OCB with a counter,
known as a __________ , that is input along with the plaintext into the encryption algorithm.
known as a __________ , that is input along with the plaintext into the encryption algorithm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
__________ systems assign access rights to roles instead of individual users.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck