IoT Sec Quiz 2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10
At a glance
Powered by AI
The security requirements for a smart home should include WPA2 for wireless security, encryption of data, strong authentication, and keeping device firmware up-to-date.

Ensure that the IoT devices in use or to be purchased are secure and that device security has been adequately configured.

An application dashboard can analyze and display user activity data when smart personal fitness devices send exercise data to a cloud computing service for storage and analysis.

Question 1

2 / 2 pts
A threat actor parks close to the home of a user and uses packet capture software
to intercept the home wireless traffic. The threat actor then analyzes the traffic of
the temperature sensor of the home to determine if someone is in the house now.
Which factor of the smart home security system is affected by this attack?

firmware

authentication

WPA2

Correct!

encryption

Refer to curriculum topic: 1.2.1


In general, the security requirements for a smart home should include the
following:

 WPA2 - The wireless network should use the latest Wi-Fi security, which is
currently WPA2.
 Encryption – It protects the confidentiality and integrity of information
transmitted over a network.
 Authentication - Strong authentication protects the device from
unauthorized use or reconfiguration and prevents disclosure or
modification of the data stored on the device.
 Firmware – The IoT device manufacturers should update the firmware for
any newly discovered vulnerabilities. The home IoT device users should
enable the checking of updates automatically.

Question 2
2 / 2 pts
What is the best practice to mitigate risks in healthcare IoT?

Ensure that all IoT devices that are provided are from the same manufacturer.
Ensure that the IoT devices run the latest model of the operating system.

Ensure that the IoT devices purchased carry a minimum 5-year warranty.

Correct!

Ensure that the IoT devices in use or to be purchased are secure and that device
security has been adequately configured.

Refer to curriculum topic: 1.2.2


The best way to mitigate risks in healthcare IoT is to not put vulnerable devices on
the network in the first place. Device manufacturers must design and build their
devices with security in mind throughout the development lifecycle. Healthcare
personnel must ensure the devices they use or purchase are secure and that
device security has been adequately configured.

Question 3
2 / 2 pts
Which cloud computing application feature provides users with rich visualization
to discover and communicate categorized and summarized health exercise data?

heart monitoring

Correct!

dashboard

wireless connection

location service

Refer to curriculum topic: 1.2.2


An application dashboard can analyze and display user activity data when smart
personal fitness devices send exercise data to a cloud computing service for
storage and analysis.

Question 4
2 / 2 pts
Which type of security vulnerability was targeted by the ransomware WannaCry
and WannaCrypt?

phishing

distributed denial of service

Correct!

unpatched, older versions of Windows

denial of service
Refer to curriculum topic: 1.1.1
WannaCry or WannaCrypt ransomware targeted unpatched, older versions of
Windows. They encrypted user data and demanded ransom payments in Bitcoin.
The systems that were affected by the attack were ones that did not have the
latest patches applied.

Question 5
2 / 2 pts
Which statement describes a risk to a patient due to security vulnerabilities of
healthcare devices?

The patient needs to move to a different healthcare facility.

The patient cannot communicate with family members.

Correct!

Vital therapies can be manipulated or interrupted.

The heart monitoring device needs upgrading.

Refer to curriculum topic: 1.2.2


Vulnerabilities in connected healthcare devices result in many risks. For example,
if a threat actor can get into these devices due to weak or open authentication,
vital therapies can be manipulated, interrupted, or disabled, resulting in patient
injury or death.

Question 6
2 / 2 pts
Which storage medium is used to hold the PL-App image on a Raspberry Pi?

SSD

HDD

USB flash drive

Correct!

µSD card

Refer to curriculum topic: 1.2.3


The PL-App launcher application creates and places an OS image onto a microSD
(µSD) card that is inserted into the Raspberry Pi for its operation.

Question 7
2 / 2 pts
What tool is used by nefarious individuals or groups to accelerate reconnaissance
of internet-connected devices?
Correct!

Shodan

DDoS

DoS

Mirai
Refer to curriculum topic: 1.1.1
Shodan is a tool used by researchers, security professionals, large enterprises, and
computer emergency response teams (CERTs) to find specific devices and device
types. It is also used by threat actors to accelerate reconnaissance of internet-
connected devices.

Question 8
2 / 2 pts
Which device is targeted most by Mirai?
Correct!

CCTV

switch

router

end device such as a PC or printer

Refer to curriculum topic: 1.1.1


Mirai most often targets closed-circuit television (CCTV) cameras. Using a brute
force dictionary attack, Mirai runs through a list of default usernames and
passwords.

Question 9
2 / 2 pts
Which statement describes the function of the Kali VM?

Kali is a popular VM appliance for network-based intrusion detection.

Kali is a popular Linux distribution for advanced graphical design projects.

Correct!
Kali is a popular Linux distribution VM that contains many tools used for
assessing network security.

Kali is a popular VM appliance for a network-based firewall.

Refer to curriculum topic: 1.2.3


Kali is a very popular Linux distribution that contains many tools for assessing
network security. It is designed for digital forensics and penetration testing.

Question 10
2 / 2 pts
True or False?

In a smart home implementation, fog computing is a better option compared with


cloud computing to process status and configuration changes for IoT devices.
Correct!

true

false

Refer to curriculum topic: 1.2.1


Fog computing is the computing process implemented locally. It is a better choice,
compared with cloud computing, because local computing and processing can
reduce latency of communication and provide fast response.

Question 11
2 / 2 pts
Which IoT technology type would include a compromised home temperature
sensor causing a home to be uncomfortably hot?

operational technology

information technology

industry technology
Correct!
consumer technology

Refer to curriculum topic: 1.1.2


IoT security includes devices and applications from information technology (IT),
operational technology (OT), and consumer technology (CT).

 IT - includes devices in the data center, in the cloud, bring your own
devices (BYODs), and thousands of sensors and actuators connected in
the field
 OT - includes industrial control systems (ICSs), supervisory control and
data acquisition (SCADA) systems, and all the devices that connect to
these systems
 CT - includes connected devices in the home, wearable technology, smart
cars, and more

Question 12
2 / 2 pts
In an IoT healthcare monitoring system design, what kind of components form a
body sensor network?
Correct!

sensors

location and Bluetooth service

gateway and cloud computing

sensors and gateway

Refer to curriculum topic: 1.2.2


A body sensor network (BSN) is formed by several different sensors that a patient
is wearing that collect health information about a patient. A gateway device
connects the BSN to the monitoring platform across the internet.

Question 13
0 / 2 pts
Which technology type describes an SQL injection that has compromised a
database?
Correct Answer

information technology

You Answered

operational technology

industry technology

consumer technology
Refer to curriculum topic: 1.1.2
IoT security includes devices and applications from information technology (IT),
operational technology (OT), and consumer technology (CT).

 IT - includes devices in the data center, in the cloud, bring your own
devices (BYODs), and thousands of sensors and actuators connected in
the field
 OT - includes industrial control systems (ICSs), supervisory control and
data acquisition (SCADA) systems, and all the devices that connect to
these systems
 CT - includes connected devices in the home, wearable technology, smart
cars, and more

Question 14
0 / 2 pts
According to the National Initiative for Cybersecurity Education (NICE)
Cybersecurity Workforce Framework by NIST, which work category defines risk
management?
Correct Answer

Securely Provision

You Answered

Protect and Defend


Investigate

Analyze

Refer to curriculum topic: 1.1.3


Risk management is in the Securely Provision work category of the National
Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce
Framework by NIST. Risk management includes all the processes necessary to
assure that existing and new IT systems meet the cybersecurity and risk
requirements of an organization.

Question 15
2 / 2 pts
A threat actor uses network scanning tools and penetration tools to discover the
IP address and manufacturer of a home wireless router. The threat actor then
uses internet searches to discover the default administrative access details.
Successful remote access of the home router allows the threat actor to use it as a
vector to attack other devices. Which element of smart home security is affected
by this attack?

WPA2

Correct!

authentication

firmware

encryption

Refer to curriculum topic: 1.2.1


In general, the security requirements for a Smart Home should include these:

 WPA2 - The wireless network should use the latest Wi-Fi security which is
currently WPA2.
 Encryption – It protects the confidentiality and integrity of information
transmitted over a network.
 Authentication - Strong authentication protects the device from
unauthorized use or reconfiguration and prevents disclosure or
modification of the data stored on the device.
 Firmware – The IoT device manufacturers should update the firmware for
any newly discovered vulnerabilities. The home IoT device users should
enable the checking of updates automatically.

PreviousNext
Last Attempt Details:
Time: 8 minutes

Current Score: 26 out of 30

Kept Score: 26 out of 30


2 Attempts so far
View Previous Attempts
Unlimited Attempts
Take the Quiz Again
(Will keep the highest of all your

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy