0% found this document useful (0 votes)
9 views3 pages

Security and Scalability of IoT Systems

The document contains a series of questions and answers related to secure data transmission and scalability in IoT systems. Key topics include protocols for secure communication, risks of unsecured firmware updates, and strategies for ensuring data integrity and minimizing latency. It also discusses challenges in layered security approaches and the implications of centralized cloud architectures for IoT scalability.

Uploaded by

joshselene29
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views3 pages

Security and Scalability of IoT Systems

The document contains a series of questions and answers related to secure data transmission and scalability in IoT systems. Key topics include protocols for secure communication, risks of unsecured firmware updates, and strategies for ensuring data integrity and minimizing latency. It also discusses challenges in layered security approaches and the implications of centralized cloud architectures for IoT scalability.

Uploaded by

joshselene29
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1. Which protocol is most commonly used for secure data transmission in IoT?

a) HTTP
b) MQTT
c) HTTPS
d) FTP

2. What is a key risk of not securing firmware updates in IoT devices?


a) Increased bandwidth usage
b) Unauthorized device control
c) Slow data processing
d) Device overheating

3. Which of the following is the best example of a man-in-the-middle attack in IoT?


a) Malware infecting a sensor
b) Unauthorized firmware update
c) Intercepting data during transmission
d) Overloading a device with requests

4. How can edge devices ensure data integrity?


a) By using lightweight communication protocols
b) By implementing checksum or hash functions
c) By reducing data packet size
d) By using open-source libraries

5. Which of the following best protects against unauthorized firmware updates?


a) Token-based authentication
b) Firmware signing with PKI
c) Using a lightweight OS
d) Real-time operating systems

6. What is a potential drawback of implementing strong encryption on IoT devices?


a) Increased latency and power consumption
b) Difficulty in scaling networks
c) Reduced data accuracy
d) Inability to process real-time data

7. In a layered security approach for IoT, securing which layer is the most challenging?
a) Application Layer
b) Network Layer
c) Physical Layer
d) Data Layer
8. Horizontal scalability in IoT refers to:
a) Adding more devices or nodes to the system
b) Upgrading device capabilities
c) Increasing cloud storage
d) Reducing communication protocols

9. Which scalability solution is best for managing sudden spikes in data traffic?
a) Vertical scalability
b) Load balancing
c) Redundant gateways
d) Lightweight operating systems

10. What is a potential issue with using centralized cloud architectures for IoT scalability?
a) Increased device failure
b) Higher latency due to network distance
c) Lack of interoperability
d) Incompatibility with wireless protocols

11. Which protocol is most suited for lightweight and scalable IoT systems?
a) MQTT
b) HTTP
c) SMTP
d) FTP

12. To reduce latency in a scalable IoT system, devices should:


a) Compress data before transmission
b) Perform processing locally on the edge
c) Use a centralized database
d) Avoid using wireless protocols

13. Using ___ cloud architecture allows IoT systems to balance scalability and data privacy.
14. To minimize latency and bandwidth usage, IoT systems often perform ___ processing on the
devices themselves.
15. The technique of distributing tasks across multiple devices or servers to avoid overloading is
called ___.
ANSWERS

1. c) HTTPS
2. b) Unauthorized device control
3. c) Intercepting data during transmission
4. b) By implementing checksum or hash functions
5. b) Firmware signing with PKI
6. a) Increased latency and power consumption
7. c) Physical Layer
8. a) Adding more devices or nodes to the system
9. b) Load balancing
10. b) Higher latency due to network distance
11. a) MQTT
12. b) Perform processing locally on the edge
13. Hybrid
14. Local or Edge
15. Load Balancing

You might also like