You are on page 1of 11

25/2/2020 IoT Security 1.

1 Chapter 4 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD

IoT Security 1.1 Chapter 4 Quiz


Due No due date Points 30 Questions 15 Time Limit None
Allowed Attempts Unlimited

Instructions
This quiz covers the content presented in IoT Security chapter 4. This quiz is designed for practice.
You will be allowed multiple attempts and the grade does not appear in the gradebook.

There are multiple task types that may be available in this quiz. In some task types, partial credit
scoring is allowed to foster learning. Please note that on tasks with multiple answers, points can be
deducted for selecting incorrect options.

At the completion of the quiz, some items may display feedback. The feedback will reference the
source of the content. Example: "Refer to curriculum topic: 1.2.3" - indicates that the source of the
material for this task is located in chapter 1, section 2, topic 3.

Form: 36404

Take the Quiz Again

Attempt History
Attempt Time Score
LATEST Attempt 1 88 minutes 20 out of 30

Score for this attempt: 20 out of 30


Submitted Feb 25 at 11:28am
This attempt took 88 minutes.

Question 1 2 / 2 pts

Which two techniques are used in a smurf attack? (Choose two.)

Correct! reflection

Correct! amplification

https://1302556.netacad.com/courses/977984/quizzes/8804238 1/11
25/2/2020 IoT Security 1.1 Chapter 4 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD

resource exhaustion

botnets

session hijacking

Refer to curriculum topic: 4.2.1


A smurf attack uses amplification and reflection techniques to
overwhelm a targeted host. The threat actor forwards ICMP
echo request messages that contain the source IP address of
the victim to a large number of hosts. These hosts all reply to
the spoofed IP address of the victim with the intent of
overwhelming it.

Question 2 0 / 2 pts

In which type of scenario would an IoT gateway not be required to


convert traffic to Wi-Fi or wired ethernet?

ou Answered when smart objects forward data within a star topology

orrect Answer when smart objects forward data using TCP/IP protocols

when smart objects forward data within a mesh network

when smart objects forward data within a hub-and-spoke topology

Refer to curriculum topic: 4.1.1


Smart objects and things can communicate directly with the
cloud or data center (IP capable) if they have their own IPv6
protocol stacks and messaging protocols. Being IP capable
allows the things to send through the IP network without
requiring translation into IP by an IoT gateway.

https://1302556.netacad.com/courses/977984/quizzes/8804238 2/11
25/2/2020 IoT Security 1.1 Chapter 4 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD

Question 3 2 / 2 pts

Which devices scan and infect more targets during the process of a
DDoS attack?

web servers

Correct! zombies

CnC servers

botmasters

Refer to curriculum topic: 4.2.1


In DDoS attack scenarios, zombies, or infected hosts, continue
to scan and infect targets with the intent of creating more
zombies. The command-and-control (CnC) server
communicates with zombies using a covert channel. When
ready, the threat actor (botmaster) uses the CnC servers to
instruct the botnet of zombies to launch a DDoS attack on a
specific target.

Question 4 2 / 2 pts

A threat actor uses a program to launch an attack by sending a flood of


UDP packets to a server on the network. The program sweeps through
all of the known ports trying to find closed ports. It causes the server to
reply with an ICMP port unreachable message and is similar to a DoS
attack. Which two programs could be used by the threat actor to launch
the attack? (Choose two.)

ping

Correct! Low Orbit Ion Cannon

https://1302556.netacad.com/courses/977984/quizzes/8804238 3/11
25/2/2020 IoT Security 1.1 Chapter 4 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD

Smurf

Correct! UDP Unicorn

WireShark

Refer to curriculum topic: 4.2.2


A threat actor can use a tool like UDP Unicorn or Low Orbit Ion
Cannon to send a flood of UDP packets to launch a UDP flood
attack that causes all the resources on a network to become
consumed. These types of programs will sweep through all the
known ports trying to find closed ports. This causes the server to
reply with an ICMP port unreachable message. Because of the
many closed ports on the server, there is so much traffic on the
segment that almost all the bandwidth gets used. The end result
is very similar to a DoS attack.

Question 5 2 / 2 pts

Which two techniques are used to carry out DoS attacks? (Choose
two.)

gaining access to the physical network and hijacking a current session

using pings to discover subnets and hosts on a network

Correct! sending an overwhelming amount of traffic

using ICMP messages to profile host operating systems

Correct! using maliciously formatted packets

https://1302556.netacad.com/courses/977984/quizzes/8804238 4/11
25/2/2020 IoT Security 1.1 Chapter 4 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD

Refer to curriculum topic: 4.2.1


With denial of service (DoS) attacks, threat actors overwhelm a
targeted host by sending an overwhelming quantity of
maliciously formatted packets. This causes the targeted host to
crash or become unable to respond to legitimate requests.

Question 6 0 / 2 pts

Which two application layer protocols use UDP? (Choose two.)

orrect Answer DHCP

ou Answered FTP

HTTPS

ou Answered HTTP

orrect Answer TFTP

Refer to curriculum topic: 4.2.2


Application layer protocols TFTP and DHCP use UDP as the
transport layer protocol. HTTP, HTTPS, and FTP use TCP as
the transport layer protocol.

Question 7 2 / 2 pts

Which parameter is used to identify applications when a user sends a


service request to a remote server?

https://1302556.netacad.com/courses/977984/quizzes/8804238 5/11
25/2/2020 IoT Security 1.1 Chapter 4 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD

source port number

server IP address

Correct! destination port number

TCP sequence number

Refer to curriculum topic: 4.2.2


In TCP/IP transmissions, the protocols at the transport layer of
both the OSI and TCP/IP model use port addressing to enable
multiple conversations to be tracked and connected with the
correct applications. The destination port number in the packets
sent by the source device identifies the requested application.

Question 8 0 / 2 pts

What are two of the most common wireless technologies used in home
automation and home security applications? (Choose two.)

Correct! Wi-Fi

orrect Answer Bluetooth

ou Answered IEEE 802.15.4

cellular

near field communication

https://1302556.netacad.com/courses/977984/quizzes/8804238 6/11
25/2/2020 IoT Security 1.1 Chapter 4 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD

Refer to curriculum topic: 4.1.2


Bluetooth and Wi-Fi both use radio waves to transmit data and
are commonly used in IoT home applications. Bluetooth is used
in wireless personal-area networks and Wi-Fi is used in wireless
local-area networks.

Question 9 2 / 2 pts

Which three IoT wireless mesh protocols are built on top of 802.15.4?
(Choose three.)

near field communication

Correct!
ZigBee

Wi-Fi

Correct!
6LoWPAN

Correct!
Thread

Bluetooth Low Energy

Refer to curriculum topic: 4.1.2


The IEEE 802.15.4 protocol was originally developed for use in
personal-area networks (PANs) and consists of physical (PHY)
and media access layer specifications. Due to the layered
architecture, developers have been able to create diverse
upper-layer protocols to allow ZigBee, Thread, and 6LoWPAN to
run on top of 802.15.4.

Question 10 2 / 2 pts

https://1302556.netacad.com/courses/977984/quizzes/8804238 7/11
25/2/2020 IoT Security 1.1 Chapter 4 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD

Which type of IoT wireless network would interconnect audio devices


and smart watches to a cell phone that serves as an IoT gateway?

wireless field-area network

Correct!
wireless personal-area network

wireless home-area network

wireless body-area network

Refer to curriculum topic: 4.1.1


The wireless personal-area network commonly uses Bluetooth
to interconnect personal fitness trackers, smart watches, and
audio devices to a cell phone that serves as an IoT gateway.

Question 11 2 / 2 pts

After host A receives a web page from server B, host A terminates the
connection with server B. Match each option to its correct step in the
normal termination proccess for a TCP connection.

Correct! Host A sends an ACK to


Step 4
server B.

Correct! Server B sends a FIN to Step 3


host A.

Correct! Host A sends a FIN to Step 1


server B.

Correct! Server B sends an ACK to Step 2


host A.

https://1302556.netacad.com/courses/977984/quizzes/8804238 8/11
25/2/2020 IoT Security 1.1 Chapter 4 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD

Refer to curriculum topic: 4.2.2

Question 12 0 / 2 pts

Which basic security service protects against alteration of data while it


is in transit?

orrect Answer message integrity

access control

ou Answered message confidentiality

replay protection

Refer to curriculum topic: 4.1.2


802.15.4 operates at the OSI physical and data link layers.
There are four basic security services performed at the data link
layer:
• Access control - prevents unauthorized devices from joining
the network
• Message integrity - protects against alteration of data while it
is in transit
• Message confidentiality - prevents threat actors from reading
the transmitted data
• Replay protection - prevents threat actors from successfully
capturing legitimate messages and sending them out on the
network at a later time

Question 13 0 / 2 pts

https://1302556.netacad.com/courses/977984/quizzes/8804238 9/11
25/2/2020 IoT Security 1.1 Chapter 4 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD

Which type of IoT wireless deployment would allow smart objects to be


deployed over a very large area?

ou Answered hub-and-spoke topology

IP capable topology

star topology

orrect Answer mesh topology

Refer to curriculum topic: 4.1.1


The wireless mesh topology allows smart objects to connect
with other smart objects to eventually reach an IoT gateway.
This allows the smart objects to be deployed over a much larger
area than would otherwise be possible if each node were
required to communicate directly with the IoT gateway.

Question 14 2 / 2 pts

Which OWASP communication layer vulnerability should be researched


when securing the IoT network traffic attack surface?

replay attack

Correct!
protocol fuzzing

unencrypted services

injection

https://1302556.netacad.com/courses/977984/quizzes/8804238 10/11
25/2/2020 IoT Security 1.1 Chapter 4 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD

Refer to curriculum topic: 4.1.1


When securing the IoT network traffic attack surface, the
following vulnerabilities should be taken into account:
LAN traffic
LAN to internet traffic
short range
nonstandard protocols
wireless
packet manipulation (protocol fuzzing)

Question 15 2 / 2 pts

Why would an engineer only use very short-range radios to allow


sensor data to travel from node to node until the data reaches the IoT
gateway?

channel requirements

high availability

increased bandwidth

Correct!
power constraints

Refer to curriculum topic: 4.1.1


IoT devices may have power constraints that may only permit
the use of very short-range radios. IoT wireless protocols may
use a topology that allows sensor data to travel from node to
node until the data reaches the gateway.

Quiz Score: 20 out of 30

https://1302556.netacad.com/courses/977984/quizzes/8804238 11/11

You might also like