Deck 23: Internet of Things Iot Security

ملء الشاشة (f)
exit full mode
سؤال
A major characteristic of a good security program is how quickly
the Iot system can be recovered after an incident has occurred.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
the __________ generation is usually thought of as the Iot and is marked by the use of billions of embedded devices.

A)second
B)third
C)fourth
D)fifth
سؤال
the main elements of a RFID system are tags and readers.
سؤال
Iot is perhaps the most complex and undeveloped area of network
security.
سؤال
Offset Codebook Mode is approved as an authenticated
encryption technique in the IEEE 802.11 wireless LAN standard.
سؤال
the encryption structure for OCB is similar to that of ECB.
سؤال
Iot devices are typically constrained devices with limited memory,
processing power, and power supply.
سؤال
Switches, sensors, and circuitry are mechanisms for tamper
detection.
سؤال
MiniSec has two operating modes: unicast (MiniSec-U) and
broadcast (MiniSec-B)
سؤال
__________ is PCs, servers, routers, and firewalls bought as It devices by enterprise It people, primarily using wired connectivity.

A)Personal technology
B)Information technology
C)Operational technology
D)Sensor/actuator technology
سؤال
Core servers also host the applications that interact with and
manage the Iot devices and analyze the Iot-generated dat
سؤال
RFID __________ are small programmable devices used for object, animal, and human tracking.

A)tags
B)transceivers
C)readers
D)actuators
سؤال
__________ is smartphones, tablets, and eBook readers bought as It devices by consumers exclusively using wireless connectivity and often multiple forms of wireless connectivity.

A)Personal technology
B)Sensor/actuator technology
C)Information technology
D)Operational technology
سؤال
A __________ contains the electronics needed to transmit and receive dat A.sensor
B)power supply
C)microcontroller
D)transceiver
سؤال
A key element in providing security in an Iot deployment is the
gateway.
سؤال
Iot is not required to support security audit for data
transmission, storage, or processing.
سؤال
the Iot is primarily driven by deeply embedded devices.
سؤال
the "smart" in a smart device is provided by a deeply embedded
transceiver.
سؤال
Personal technology is single-purpose devices bought by
consumers, It, and Ot people exclusively using wireless connectivity, generally of a single form, as part of larger systems.
سؤال
Fog computing and fog services are expected to be a distinguishing
characteristic of the Iot.
سؤال
Secure, trusted, and privacy-protected __________ capability is required so that unauthorized access of the content of data can be prohibited, integrity of data can be guaranteed, and privacy-related content of data can be protected when storing or processing data in Iot.

A)data management
B)security audit
C)mutual authentication and authorization
D)communication
سؤال
__________ is a characteristic of a system component that provides passive protection against an attack.

A)tamper integration
B)tamper resistant
C)tampering
D)tamper detection
سؤال
__________ is designed to be a link-level module that offers a high level of security, while simultaneiously keeping energy consumption low and using very little memory.
سؤال
the __________ is a term that refers to the expanding interconnection of smart devices, ranging from appliances to tiny sensors.
سؤال
___________ is single-purpose devices bought by consumers, It, and Ot people exclusively using wireless connectivity, generally of a single forms.

A)Information technology
B)Operational technology
C)Personal technology
D)Sensor/actuator technology
سؤال
__________ is designed for small embedded systems with tight requirements on memory, processing time, real-time response, and power consumption.

A)RBAC
B)tinyOs
C)MiniSec
D)ECB
سؤال
Evaluation, formatting, expanding/decoding, distillation/reduction, and assessment are examples of __________ computing operations.
سؤال
the block cipher mode of operation chosen for MiniSec is __________ .

A)OCB
B)ECB
C)RBAC
D)OtC
سؤال
__________ is techniques to ensure that the overall system is made aware of unwanted physical access.

A)tamper resistant
B)tampering
C)tamper integration
D)tamper detection
سؤال
the __________ network provides storage and processing capabilities for the massive amounts of aggregated data that originate in Iot-enabled devices at the edge.
سؤال
the core network, also referred to as the __________ network, connects geographically dispersed fog networks as well as provides access to other networks that are not part of the enterprise network.
سؤال
A __________ interconnects the Iot-enabled devices with the higher-level communication networks.

A)sensor
B)gateway
C)reader
D)microcontroller
سؤال
A __________ measures some parameter of a physical, chemical, or biological entity and delivers an electronic signal proportional to the observed characteristic, either in the form of an analog voltage level or a digital signal.
سؤال
__________ technology is machines/appliances with embedded It built by non-It companies, such as medical machiners, SCADA, process control, and kiosks, bought as appliances by enterprise Ot people and primarily using wired connectivity.
سؤال
A(n) __________ receives an electronic signal from a controller and responds by interacting with its environment to produce an effect on some parameter of a physical, chemical, or biological entity.

A)power supply
B)microcontroller
C)actuator
D)sensor
سؤال
__________ is designed to meet these requirements: data authentication,
confidentiality, replay protection, freshness, low energy overhead, and resilient to lost messages.
سؤال
A key objective for Offset Codebook Mode is __________ .

A)security
B)compatibility
C)adaptability
D)efficiency
سؤال
the key components of an Iot-enabled device are: sensor, actuator, microcontroller, transceiver, and __________ .
سؤال
the main application of __________ is wireless sensor networks and it has become the de facto OS for such networks.
سؤال
__________ is an unauthorized modification that alters the intended functioning of a system or device in a way that degrades the security it provides.

A)tampering
B)tamper integration
C)tamper resistant
D)tamper detection
سؤال
Developed by the NSA in the 1990s, __________ is one of the simplest and
fastest block cipher algorithms.
سؤال
Mechanisms for ___________ include switches, sensors, and circuitry.
سؤال
typically, a __________ is a battery.
سؤال
Both of the MiniSec operating mode schemes use OCB with a counter,
known as a __________ , that is input along with the plaintext into the encryption algorithm.
سؤال
__________ systems assign access rights to roles instead of individual users.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 23: Internet of Things Iot Security
1
A major characteristic of a good security program is how quickly
the Iot system can be recovered after an incident has occurred.
True
2
the __________ generation is usually thought of as the Iot and is marked by the use of billions of embedded devices.

A)second
B)third
C)fourth
D)fifth
C
3
the main elements of a RFID system are tags and readers.
True
4
Iot is perhaps the most complex and undeveloped area of network
security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
Offset Codebook Mode is approved as an authenticated
encryption technique in the IEEE 802.11 wireless LAN standard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
the encryption structure for OCB is similar to that of ECB.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
Iot devices are typically constrained devices with limited memory,
processing power, and power supply.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
Switches, sensors, and circuitry are mechanisms for tamper
detection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
MiniSec has two operating modes: unicast (MiniSec-U) and
broadcast (MiniSec-B)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
__________ is PCs, servers, routers, and firewalls bought as It devices by enterprise It people, primarily using wired connectivity.

A)Personal technology
B)Information technology
C)Operational technology
D)Sensor/actuator technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
Core servers also host the applications that interact with and
manage the Iot devices and analyze the Iot-generated dat
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
RFID __________ are small programmable devices used for object, animal, and human tracking.

A)tags
B)transceivers
C)readers
D)actuators
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
__________ is smartphones, tablets, and eBook readers bought as It devices by consumers exclusively using wireless connectivity and often multiple forms of wireless connectivity.

A)Personal technology
B)Sensor/actuator technology
C)Information technology
D)Operational technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
A __________ contains the electronics needed to transmit and receive dat A.sensor
B)power supply
C)microcontroller
D)transceiver
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
A key element in providing security in an Iot deployment is the
gateway.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
Iot is not required to support security audit for data
transmission, storage, or processing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
the Iot is primarily driven by deeply embedded devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
the "smart" in a smart device is provided by a deeply embedded
transceiver.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
Personal technology is single-purpose devices bought by
consumers, It, and Ot people exclusively using wireless connectivity, generally of a single form, as part of larger systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
Fog computing and fog services are expected to be a distinguishing
characteristic of the Iot.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
Secure, trusted, and privacy-protected __________ capability is required so that unauthorized access of the content of data can be prohibited, integrity of data can be guaranteed, and privacy-related content of data can be protected when storing or processing data in Iot.

A)data management
B)security audit
C)mutual authentication and authorization
D)communication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
__________ is a characteristic of a system component that provides passive protection against an attack.

A)tamper integration
B)tamper resistant
C)tampering
D)tamper detection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
__________ is designed to be a link-level module that offers a high level of security, while simultaneiously keeping energy consumption low and using very little memory.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
the __________ is a term that refers to the expanding interconnection of smart devices, ranging from appliances to tiny sensors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
___________ is single-purpose devices bought by consumers, It, and Ot people exclusively using wireless connectivity, generally of a single forms.

A)Information technology
B)Operational technology
C)Personal technology
D)Sensor/actuator technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
__________ is designed for small embedded systems with tight requirements on memory, processing time, real-time response, and power consumption.

A)RBAC
B)tinyOs
C)MiniSec
D)ECB
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
Evaluation, formatting, expanding/decoding, distillation/reduction, and assessment are examples of __________ computing operations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
the block cipher mode of operation chosen for MiniSec is __________ .

A)OCB
B)ECB
C)RBAC
D)OtC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
__________ is techniques to ensure that the overall system is made aware of unwanted physical access.

A)tamper resistant
B)tampering
C)tamper integration
D)tamper detection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
the __________ network provides storage and processing capabilities for the massive amounts of aggregated data that originate in Iot-enabled devices at the edge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
the core network, also referred to as the __________ network, connects geographically dispersed fog networks as well as provides access to other networks that are not part of the enterprise network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
A __________ interconnects the Iot-enabled devices with the higher-level communication networks.

A)sensor
B)gateway
C)reader
D)microcontroller
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
A __________ measures some parameter of a physical, chemical, or biological entity and delivers an electronic signal proportional to the observed characteristic, either in the form of an analog voltage level or a digital signal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
__________ technology is machines/appliances with embedded It built by non-It companies, such as medical machiners, SCADA, process control, and kiosks, bought as appliances by enterprise Ot people and primarily using wired connectivity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
A(n) __________ receives an electronic signal from a controller and responds by interacting with its environment to produce an effect on some parameter of a physical, chemical, or biological entity.

A)power supply
B)microcontroller
C)actuator
D)sensor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
__________ is designed to meet these requirements: data authentication,
confidentiality, replay protection, freshness, low energy overhead, and resilient to lost messages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
A key objective for Offset Codebook Mode is __________ .

A)security
B)compatibility
C)adaptability
D)efficiency
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
the key components of an Iot-enabled device are: sensor, actuator, microcontroller, transceiver, and __________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
the main application of __________ is wireless sensor networks and it has become the de facto OS for such networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
__________ is an unauthorized modification that alters the intended functioning of a system or device in a way that degrades the security it provides.

A)tampering
B)tamper integration
C)tamper resistant
D)tamper detection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
Developed by the NSA in the 1990s, __________ is one of the simplest and
fastest block cipher algorithms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
Mechanisms for ___________ include switches, sensors, and circuitry.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
typically, a __________ is a battery.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
Both of the MiniSec operating mode schemes use OCB with a counter,
known as a __________ , that is input along with the plaintext into the encryption algorithm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
__________ systems assign access rights to roles instead of individual users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.