IoT Sec Quiz 2
IoT Sec Quiz 2
IoT Sec Quiz 2
2 / 2 pts
A threat actor parks close to the home of a user and uses packet capture software
to intercept the home wireless traffic. The threat actor then analyzes the traffic of
the temperature sensor of the home to determine if someone is in the house now.
Which factor of the smart home security system is affected by this attack?
firmware
authentication
WPA2
Correct!
encryption
WPA2 - The wireless network should use the latest Wi-Fi security, which is
currently WPA2.
Encryption – It protects the confidentiality and integrity of information
transmitted over a network.
Authentication - Strong authentication protects the device from
unauthorized use or reconfiguration and prevents disclosure or
modification of the data stored on the device.
Firmware – The IoT device manufacturers should update the firmware for
any newly discovered vulnerabilities. The home IoT device users should
enable the checking of updates automatically.
Question 2
2 / 2 pts
What is the best practice to mitigate risks in healthcare IoT?
Ensure that all IoT devices that are provided are from the same manufacturer.
Ensure that the IoT devices run the latest model of the operating system.
Ensure that the IoT devices purchased carry a minimum 5-year warranty.
Correct!
Ensure that the IoT devices in use or to be purchased are secure and that device
security has been adequately configured.
Question 3
2 / 2 pts
Which cloud computing application feature provides users with rich visualization
to discover and communicate categorized and summarized health exercise data?
heart monitoring
Correct!
dashboard
wireless connection
location service
Question 4
2 / 2 pts
Which type of security vulnerability was targeted by the ransomware WannaCry
and WannaCrypt?
phishing
Correct!
denial of service
Refer to curriculum topic: 1.1.1
WannaCry or WannaCrypt ransomware targeted unpatched, older versions of
Windows. They encrypted user data and demanded ransom payments in Bitcoin.
The systems that were affected by the attack were ones that did not have the
latest patches applied.
Question 5
2 / 2 pts
Which statement describes a risk to a patient due to security vulnerabilities of
healthcare devices?
Correct!
Question 6
2 / 2 pts
Which storage medium is used to hold the PL-App image on a Raspberry Pi?
SSD
HDD
Correct!
µSD card
Question 7
2 / 2 pts
What tool is used by nefarious individuals or groups to accelerate reconnaissance
of internet-connected devices?
Correct!
Shodan
DDoS
DoS
Mirai
Refer to curriculum topic: 1.1.1
Shodan is a tool used by researchers, security professionals, large enterprises, and
computer emergency response teams (CERTs) to find specific devices and device
types. It is also used by threat actors to accelerate reconnaissance of internet-
connected devices.
Question 8
2 / 2 pts
Which device is targeted most by Mirai?
Correct!
CCTV
switch
router
Question 9
2 / 2 pts
Which statement describes the function of the Kali VM?
Correct!
Kali is a popular Linux distribution VM that contains many tools used for
assessing network security.
Question 10
2 / 2 pts
True or False?
true
false
Question 11
2 / 2 pts
Which IoT technology type would include a compromised home temperature
sensor causing a home to be uncomfortably hot?
operational technology
information technology
industry technology
Correct!
consumer technology
IT - includes devices in the data center, in the cloud, bring your own
devices (BYODs), and thousands of sensors and actuators connected in
the field
OT - includes industrial control systems (ICSs), supervisory control and
data acquisition (SCADA) systems, and all the devices that connect to
these systems
CT - includes connected devices in the home, wearable technology, smart
cars, and more
Question 12
2 / 2 pts
In an IoT healthcare monitoring system design, what kind of components form a
body sensor network?
Correct!
sensors
Question 13
0 / 2 pts
Which technology type describes an SQL injection that has compromised a
database?
Correct Answer
information technology
You Answered
operational technology
industry technology
consumer technology
Refer to curriculum topic: 1.1.2
IoT security includes devices and applications from information technology (IT),
operational technology (OT), and consumer technology (CT).
IT - includes devices in the data center, in the cloud, bring your own
devices (BYODs), and thousands of sensors and actuators connected in
the field
OT - includes industrial control systems (ICSs), supervisory control and
data acquisition (SCADA) systems, and all the devices that connect to
these systems
CT - includes connected devices in the home, wearable technology, smart
cars, and more
Question 14
0 / 2 pts
According to the National Initiative for Cybersecurity Education (NICE)
Cybersecurity Workforce Framework by NIST, which work category defines risk
management?
Correct Answer
Securely Provision
You Answered
Analyze
Question 15
2 / 2 pts
A threat actor uses network scanning tools and penetration tools to discover the
IP address and manufacturer of a home wireless router. The threat actor then
uses internet searches to discover the default administrative access details.
Successful remote access of the home router allows the threat actor to use it as a
vector to attack other devices. Which element of smart home security is affected
by this attack?
WPA2
Correct!
authentication
firmware
encryption
WPA2 - The wireless network should use the latest Wi-Fi security which is
currently WPA2.
Encryption – It protects the confidentiality and integrity of information
transmitted over a network.
Authentication - Strong authentication protects the device from
unauthorized use or reconfiguration and prevents disclosure or
modification of the data stored on the device.
Firmware – The IoT device manufacturers should update the firmware for
any newly discovered vulnerabilities. The home IoT device users should
enable the checking of updates automatically.
PreviousNext
Last Attempt Details:
Time: 8 minutes