Professional Documents
Culture Documents
Instructions
This quiz covers the content presented in IoT Security chapter 6. This quiz is designed for practice.
You will be allowed multiple attempts and the grade does not appear in the gradebook.
There are multiple task types that may be available in this quiz. In some task types, partial credit
scoring is allowed to foster learning. Please note that on tasks with multiple answers, points can be
deducted for selecting incorrect options.
At the completion of the quiz, some items may display feedback. The feedback will reference the
source of the content. Example: "Refer to curriculum topic: 1.2.3" - indicates that the source of the
material for this task is located in chapter 1, section 2, topic 3.
Form: 36406
Attempt History
Attempt Time Score
LATEST Attempt 1 22 minutes 30 out of 30
Question 1 2 / 2 pts
rainbow tables
https://1302556.netacad.com/courses/977984/quizzes/8804239 1/11
25/2/2020 IoT Security 1.1 Chapter 6 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
dictionary attack
Question 2 2 / 2 pts
nonce block
block 0
root block
Question 3 2 / 2 pts
https://1302556.netacad.com/courses/977984/quizzes/8804239 2/11
25/2/2020 IoT Security 1.1 Chapter 6 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Question 4 2 / 2 pts
https://1302556.netacad.com/courses/977984/quizzes/8804239 3/11
25/2/2020 IoT Security 1.1 Chapter 6 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Question 5 2 / 2 pts
key sharing
encryption
Correct! trust
fee collection
Question 6 2 / 2 pts
https://1302556.netacad.com/courses/977984/quizzes/8804239 4/11
25/2/2020 IoT Security 1.1 Chapter 6 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Question 7 2 / 2 pts
https://1302556.netacad.com/courses/977984/quizzes/8804239 5/11
25/2/2020 IoT Security 1.1 Chapter 6 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Question 8 2 / 2 pts
Which password attack method uses a list that contains hashed values
and clear text equivalents in order to speed up the process of gaining
entry to a system?
brute force
dictionary attack
Question 9 2 / 2 pts
https://1302556.netacad.com/courses/977984/quizzes/8804239 6/11
25/2/2020 IoT Security 1.1 Chapter 6 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
It is a list of all the devices or people that have touched the transaction.
Correct!
It is an algorithm used for transaction validation.
It is a process that includes a risk factor value that can change as the
transaction moves through the process.
Question 10 2 / 2 pts
A DFD uses zones to limit the exposure of different parts of the system
to vulnerabilities associated with each zone.
A DFD includes entry points into an IoT system, but not the people
using those entry points.
Correct!
A DFD depicts the pathways that data will take between different
functional components of the system.
https://1302556.netacad.com/courses/977984/quizzes/8804239 7/11
25/2/2020 IoT Security 1.1 Chapter 6 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Question 11 2 / 2 pts
Correct!
Identify security objectives.
Correct!
Document the IoT system architecture.
Recommend mitigation.
Correct!
Decompose the IoT system.
Question 12 2 / 2 pts
https://1302556.netacad.com/courses/977984/quizzes/8804239 8/11
25/2/2020 IoT Security 1.1 Chapter 6 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Correct!
a technology that can displace competitors because it uses a very
different approach
Question 13 2 / 2 pts
T-V pairing
Correct!
decentralized ledger
digital signature
https://1302556.netacad.com/courses/977984/quizzes/8804239 9/11
25/2/2020 IoT Security 1.1 Chapter 6 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
Question 14 2 / 2 pts
Correct!
port mapping tools
Question 15 2 / 2 pts
https://1302556.netacad.com/courses/977984/quizzes/8804239 10/11
25/2/2020 IoT Security 1.1 Chapter 6 Quiz: ELECTRO-S5-G18-IoT_SeC-P55-JD
https://1302556.netacad.com/courses/977984/quizzes/8804239 11/11