Iot Fundamentals: Iot Security Final (Eoc) Assessment Answers
Iot Fundamentals: Iot Security Final (Eoc) Assessment Answers
Iot Fundamentals: Iot Security Final (Eoc) Assessment Answers
1-Which type of access control model assigns security level labels to information and is typically used
in military or mission critical applications ?
Attribute-based
2-What are two attributes of IoT that make applying traditional security methods challenging?
(Choose Two)
Decentralized topologies
3-A security researcher has completed a vulnerability assessment and has documented a list of
vulnerabilities. When performing risk assessment,what should these documented items be
translated into?
Risks
4-An IoT devices uses BusyBox. What is the purpose of entering the busybox command in the
command line ?
5-Which technology type describes a refrigerator that has become part of botnet that I attacking
businesses ?
Consumer technology
6-Why are most IoT devices not directly connected to a Wi-Fi access point or router ?
7-Why do some IoT devices rely on gateways for the internet connection ?
Eavesdropping attack
Descentralized ledger
Digital signature
10-Which IoT technology commonly benefits from the deployment of a star topology ?
Home automation
11-What is one of the most widely exposed vulnerabilities listed by the Open Web Applications
Security Project (OWASP) ?
Phishing
12-Which two types of IoT firmware vulnerabilities are caused by the use of default or weak login
credentials ?(choose two )
Default Credentials
13-When comparing the OSI and the IoT reference models, what is the intent of the IoT reference
model ?
Provide common terminology and help clarify how information flows and is processed for a
unified IoT industry
14-A threat actor wants to interrupt a normal TCP communication between two hosts by sending a
spoofed packet to both endpoints. Which TCP option bit would the threat actor set in the spoofed
packet ?
ACK
15-A network security engineer is reviewing security logs and notices an unauthorized device
sending authenticated messages that accured during a previous M2M session.Which basic security
service would protect against this type of incident?
Replay protection
16-Put the steps in the Threat Modeling process into the correct order
17-Which two CPU types are based on the Complex Instruction Set Computing architecture?(choose
two)
AMD
INTEL
18-Which type of IoT wireless network would use ruggedized network components to interconnect
sensors and actuators at dispersed locations in challenging manufacturing environments ?
19-A user is concerned that the SD Card in surveillance cameras could be stolen or destroyed by an
attacker.Which security measure can help protect the surveillance cameras?
20-
GPS---location service
ACCELEROMETER----motion detection
21- In the context of the importance of security in IoT networks, which model provides a common
frameworks for understanding the placement of various standards and protocols in an IoT system?
ETSI
22-What are three best practices used to mitigate xss attacks? (choose three)
Escaping
Validating input
Sanitizing
Operational technology
24-What are three potential vulnerabilities related to attacks toward the memory of an IoT device ?
Encryption key
Sensitive data
25-A manufacturing organization is generating a large amount of data via their IoT sensors.At which
location should the data be processed if it is to be processed close to the ground where the IoT
sensors are connected to the network?
Mist
26-What is the intent of a threat actor that is performing a port scan against a targeted device ?
27-What is the challenge that must be overcome with symmetric key or cryptography ?
Having the sender and receiver agree on the same secret key without anyone intercepting it
30-For the I0T reference model ,what are two security measures that should be considered ?(choose
Tw0)
The hardware and software of each device connected to the IoT network should be secured.
The movement of data and communications between each level should be secured
Applications--------CoAP , Zigbee
Damage
Exploitability
Affected users
Only allow a limited number of authentication failures before an account is locked out
35-When creating devices for the home IoT market ,what are vendors commonly sacrificing in order
to provide simplicity of setup and administration ?
Security
36-Match the security requirement with the appropriate layer of the IoT functional model.
Blockchain
38-A threat actor uses a newly discovered vulnerability to access the home wireless router of a user.
The threat actor then changes the password for the wireless network served by the router and
causes all wireless devices to lose connectivity. Which factor of smart home security is affected by
this attack?
Firmware
Device cloning
41-What are two OWASP communication layer vulnerabilities commonly found when securing the
IoT device network services attack surface ?(choose two.)
42-In a typical smart home setup which two devices directly share the cable signal from the local
cable service provider? (choose two)
TV
Cable modem
43-According to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce
by NIST, which work role in the Vulnerability Assessment and Management specialty area performs
assessments of IT systems and identifies where those systems deviate from acceptable
configurations or policy?
44-A threat actor has used malicious commands to trick the database into returning unauthorized
record and other data. Which web front-end vulnerability is the threat actor exploiting?
Cross-site scripting
45-According to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce
Framework by NIST, which work role in the risk management speciality area conducts
comprehensive assessments of the management ,operational, and technical security controls to
determine their overall effectiveness?
46-What are three items that should be included in the documentation describing the components
of the IoT system at each layer? (choose three)
Devices
Communications network
Applications
47-Which DFD symbol represents data output from sensing, actuating, traffic forwarding, analysis
and control systems?
Process
Python
49-Match the question to one of the three contributors to the determination of risk when
performing a risk assessment.
Proof of work