These are some simple Multiple Choice Questions (MCQs) on the topic of Internet of Things (IOT) with the correct solution with it. You can have a look through it just to check/verify your theory knowledge in IOT domain. Check out the FREE Internet of Things (IOT) Tutorials here with hands-on
experiments on Arduino, NodeMCU & Raspberry Pi boards. [ With SourceCode ready to download for free ]
_________ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.
a. Cross-site scoring scripting
b. Cross-site request forgery
c. Two-factor authentication
d. Cross-site
scripting
A Web site that allows users to enter text, such as a comment or a name, and then stores it and later displays it to other users, is potentially vulnerable to a kind of attack called a ___________________ attack.
a. Cross-site scripting
b. Cross-site scoring scripting
c. Cross-site request forgery
d. Two-factor authentication
AES uses a 128 bit block
size and a key size of __________ bits.
a. 128 or 192
b. 128 or 256
c. 128, 192, or 256
d. 128, 192, or 256
All of following are biometric techniques except
a. Badge
b. Retina
c. Face
d. Palm print
An encryption scheme is
unconditionally secure if the ciphertext generated does not contain enough information to determine uniquely the corresponding plaintext, no matter how much cipher text is available.
a. True
b. False
Check-out our free tutorials on IOT (Internet of Things):
Even with two-factor authentication, users may still be vulnerable to_____________attacks.
a. Scripting
b. Cross attack
c. Man-in-the-middle
d.
Radiant
Example of a good password is
a. name of a partner or spouse
b. word related to a job or hobby
c. words contains multiple random digits
d. name of a child or pet
The DES algorithm has a key length of
a. 64 Bits
b. 128 Bits
c. 16 Bits
d.
32 Bits
If the sender and receiver use different keys, the system is referred to as conventional cipher system.
a. True
b. False
In asymmetric key cryptography, the private key is kept by
a. Receiver
b. sender and receiver
c. Sender
d. all the connected devices to the
network
In cryptography, what is cipher?
a. none of the mentioned
b. encrypted message
c. both algorithm for performing encryption and decryption and encrypted message
d. algorithm for performing encryption and decryption
In dealing with the risk, which response is done by buying insurance
a. Risk acceptance
b. Risk mitigation
c. Risk transfer
d. Risk avoidance
In DREAD methodology of risk analysis in threat analysis, how is the Risk score for each threat is calculated
Click here to see solutions for all Machine Learning Coursera Assignments.
Click here to see more codes for Raspberry Pi 3 and
similar Family.
Click here to see more codes for NodeMCU ESP8266 and similar Family.
Click here to see more codes for Arduino Mega (ATMega 2560) and similar Family.
Feel free to ask doubts in the comment
section. I will try my best to answer it.
If you find this helpful by any mean like, comment and share the post.
This is the simplest way to encourage me to keep doing such work.
Which means only authorized users are capable of accessing the information?
1. Answer: B) The term which denotes that only authorized users are capable of accessing the information is known as availability.
Which happens first authorization or authentication Mcq?
Authentication is done before the authorization process, whereas the authorization process is done after the authentication process. In the authentication process, the identity of users are checked for providing the access to the system.
Which of the following can be considered as the elements of cyber security Mcq?
Different Elements of Cybersecurity:.
Application security..
Information security..
Disaster Recovery Planning..
Network Security..
End-user Security..
Operational Security..
Which of the following options ensures privacy of messages sent and received?
Nonrepudiation ensures that no party can deny that it sent or received a message via encryption and/or digital signatures or approved some information. It also cannot deny the authenticity of its signature on a document.