Professional Documents
Culture Documents
Instructions
This quiz covers the content presented in IoT Security chapter 5. This quiz is designed for practice.
You will be allowed multiple attempts and the grade does not appear in the gradebook.
There are multiple task types that may be available in this quiz. In some task types, partial credit
scoring is allowed to foster learning. Please note that on tasks with multiple answers, points can be
deducted for selecting incorrect options.
At the completion of the quiz, some items may display feedback. The feedback will reference the
source of the content. Example: "Refer to curriculum topic: 1.2.3" - indicates that the source of the
material for this task is located in chapter 1, section 2, topic 3.
Form: 36405
Attempt History
Attempt Time Score
LATEST Attempt 1 10 minutes 30 out of 30
Question 1 2 / 2 pts
True or False?
On some home routers, to compromise the security on the router, a
Flash applet can be used to change the DNS server settings with an
UPnP request.
Correct! true
https://1302556.netacad.com/courses/977984/quizzes/8804235 1/14
25/2/2020 IoT Security 1.1 Chapter 5 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
false
Question 2 2 / 2 pts
Question 3 2 / 2 pts
https://1302556.netacad.com/courses/977984/quizzes/8804235 2/14
25/2/2020 IoT Security 1.1 Chapter 5 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Correct!
It allows for a retained messages option that can be used to provide
status updates.
Clients that are connected will prevent other clients from connecting,
thus preserving power.
The last will and testament option allows for immediate session
termination, thus saving power.
Question 4 2 / 2 pts
cross-site scripting
https://1302556.netacad.com/courses/977984/quizzes/8804235 3/14
25/2/2020 IoT Security 1.1 Chapter 5 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
SQL injections
security misconfiguration
Question 5 2 / 2 pts
For which type of devices is the use of DDS (data distribution service)
in M2M connections well suited?
https://1302556.netacad.com/courses/977984/quizzes/8804235 4/14
25/2/2020 IoT Security 1.1 Chapter 5 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
for devices where live data is not the only data and which use a client-
server model
for devices that require a collection of data for centralized storage and
filtration
Correct!
for devices that measure real-time data in microseconds that need to be
filtered and delivered efficiently
Question 6 2 / 2 pts
Correct!
It uses an addressing scheme (name@domain.com) which helps
simplify connections.
https://1302556.netacad.com/courses/977984/quizzes/8804235 5/14
25/2/2020 IoT Security 1.1 Chapter 5 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Question 7 2 / 2 pts
SQL injections
malware
user enumeration
https://1302556.netacad.com/courses/977984/quizzes/8804235 6/14
25/2/2020 IoT Security 1.1 Chapter 5 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Question 8 2 / 2 pts
It is mostly used for multiple clients where live data is the only data.
https://1302556.netacad.com/courses/977984/quizzes/8804235 7/14
25/2/2020 IoT Security 1.1 Chapter 5 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Correct!
It allows for efficient sensor and node communication without requiring
a centralized control mechanism.
Question 9 2 / 2 pts
Correct!
Apply payload encryption.
https://1302556.netacad.com/courses/977984/quizzes/8804235 8/14
25/2/2020 IoT Security 1.1 Chapter 5 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Question 10 2 / 2 pts
A threat actor has injected JavaScript code into the output of a web
application and is manipulating client-side scripts to run as desired in
the browser. Which web front-end vulnerability is the threat actor
exploiting?
Correct!
cross-site scripting
broken authentication
security misconfiguration
SQL injections
https://1302556.netacad.com/courses/977984/quizzes/8804235 9/14
25/2/2020 IoT Security 1.1 Chapter 5 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Question 11 2 / 2 pts
Correct!
Hnmmmkoty#4
ajkyfrjn0999y*
1245rdghy67#
12gnkjl9!!!ddfgr
Question 12 2 / 2 pts
What are two of the most widely exposed vulnerabilities currently listed
by the Open Web Applications Security Project (OWASP)? (Choose
two.)
Correct!
username enumeration
phishing
spam
malware
Correct!
account lockout
https://1302556.netacad.com/courses/977984/quizzes/8804235 10/14
25/2/2020 IoT Security 1.1 Chapter 5 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Question 13 2 / 2 pts
denial-of-service
Correct!
routing attack
username enumeration
https://1302556.netacad.com/courses/977984/quizzes/8804235 11/14
25/2/2020 IoT Security 1.1 Chapter 5 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Question 14 2 / 2 pts
https://1302556.netacad.com/courses/977984/quizzes/8804235 12/14
25/2/2020 IoT Security 1.1 Chapter 5 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Question 15 2 / 2 pts
adware
malware
botnets
https://1302556.netacad.com/courses/977984/quizzes/8804235 13/14
25/2/2020 IoT Security 1.1 Chapter 5 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
https://1302556.netacad.com/courses/977984/quizzes/8804235 14/14