Professional Documents
Culture Documents
Instructions
This quiz covers the content presented in IoT Security chapter 4. This quiz is designed for practice.
You will be allowed multiple attempts and the grade does not appear in the gradebook.
There are multiple task types that may be available in this quiz. In some task types, partial credit
scoring is allowed to foster learning. Please note that on tasks with multiple answers, points can be
deducted for selecting incorrect options.
At the completion of the quiz, some items may display feedback. The feedback will reference the
source of the content. Example: "Refer to curriculum topic: 1.2.3" - indicates that the source of the
material for this task is located in chapter 1, section 2, topic 3.
Form: 36404
Attempt History
Attempt Time Score
LATEST Attempt 1 88 minutes 20 out of 30
Question 1 2 / 2 pts
Correct! reflection
Correct! amplification
https://1302556.netacad.com/courses/977984/quizzes/8804238 1/11
25/2/2020 IoT Security 1.1 Chapter 4 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
resource exhaustion
botnets
session hijacking
Question 2 0 / 2 pts
orrect Answer when smart objects forward data using TCP/IP protocols
https://1302556.netacad.com/courses/977984/quizzes/8804238 2/11
25/2/2020 IoT Security 1.1 Chapter 4 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Question 3 2 / 2 pts
Which devices scan and infect more targets during the process of a
DDoS attack?
web servers
Correct! zombies
CnC servers
botmasters
Question 4 2 / 2 pts
ping
https://1302556.netacad.com/courses/977984/quizzes/8804238 3/11
25/2/2020 IoT Security 1.1 Chapter 4 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Smurf
WireShark
Question 5 2 / 2 pts
Which two techniques are used to carry out DoS attacks? (Choose
two.)
https://1302556.netacad.com/courses/977984/quizzes/8804238 4/11
25/2/2020 IoT Security 1.1 Chapter 4 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Question 6 0 / 2 pts
ou Answered FTP
HTTPS
ou Answered HTTP
Question 7 2 / 2 pts
https://1302556.netacad.com/courses/977984/quizzes/8804238 5/11
25/2/2020 IoT Security 1.1 Chapter 4 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
server IP address
Question 8 0 / 2 pts
What are two of the most common wireless technologies used in home
automation and home security applications? (Choose two.)
Correct! Wi-Fi
cellular
https://1302556.netacad.com/courses/977984/quizzes/8804238 6/11
25/2/2020 IoT Security 1.1 Chapter 4 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Question 9 2 / 2 pts
Which three IoT wireless mesh protocols are built on top of 802.15.4?
(Choose three.)
Correct!
ZigBee
Wi-Fi
Correct!
6LoWPAN
Correct!
Thread
Question 10 2 / 2 pts
https://1302556.netacad.com/courses/977984/quizzes/8804238 7/11
25/2/2020 IoT Security 1.1 Chapter 4 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Correct!
wireless personal-area network
Question 11 2 / 2 pts
After host A receives a web page from server B, host A terminates the
connection with server B. Match each option to its correct step in the
normal termination proccess for a TCP connection.
https://1302556.netacad.com/courses/977984/quizzes/8804238 8/11
25/2/2020 IoT Security 1.1 Chapter 4 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Question 12 0 / 2 pts
access control
replay protection
Question 13 0 / 2 pts
https://1302556.netacad.com/courses/977984/quizzes/8804238 9/11
25/2/2020 IoT Security 1.1 Chapter 4 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
IP capable topology
star topology
Question 14 2 / 2 pts
replay attack
Correct!
protocol fuzzing
unencrypted services
injection
https://1302556.netacad.com/courses/977984/quizzes/8804238 10/11
25/2/2020 IoT Security 1.1 Chapter 4 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Question 15 2 / 2 pts
channel requirements
high availability
increased bandwidth
Correct!
power constraints
https://1302556.netacad.com/courses/977984/quizzes/8804238 11/11