Question

Question 1 1 point possible (graded) True or False: Because IoT is an ecosystem, IoT Security...

Question 1

1 point possible (graded)

True or False: Because IoT is an ecosystem, IoT Security is not just device security.

True

False

Question 2

1 point possible (graded)

When comparing IoT malware to traditional viruses, worms, or spam, which of these statements are true? (Select three)

Conventional anti-virus or anti-spam schemes work well for IoT malware detection and prevention.

IoT malware has much less user interaction.

IoT malware is hard to kill due to lack of direct interface with the infected product.

It is not easy to detect IoT malware using traditional anti-virus schemes.

Question 3

1 point possible (graded)

What are the two important security principles inside the “secure communication” stack of an IoT system: (Select two)

Device initiated connections

Device Intelligence

Edge processing

Identification, authentication and encryption

Messaging control

Remote control and update of devices

Question 4

1 point possible (graded)

True or False: In practice, when we assess IoT security, we need to model threats at three levels: device level (including data storage and firmware on device), connection levels (including communications between components in IoT ecosystem), and system levels (including APIs with cloud vendor, partner applications).

True

False

Question 5

1 point possible (graded)

Within the IoT ecosystem, “Cleartext usernames” and “Cleartext passwords” are two IoT surface areas in:

Device Memory

Device Network Services

Ecosystem Access Control

Web Cloud Interface

Question 5

1 point possible (graded)

Within the IoT ecosystem, “Cleartext usernames” and “Cleartext passwords” are two IoT surface areas in:

Device Memory

Device Network Services

Ecosystem Access Control

Web Cloud Interface

Question 5

1 point possible (graded)

Within the IoT ecosystem, “Cleartext usernames” and “Cleartext passwords” are two IoT surface areas in:

Device Memory

Device Network Services

Ecosystem Access Control

Web Cloud Interface

Question 5

1 point possible (graded)

Within the IoT ecosystem, “Cleartext usernames” and “Cleartext passwords” are two IoT surface areas in:

Device Memory

Device Network Services

Ecosystem Access Control

Web Cloud Interface

Question 6

1 point possible (graded)

User or device credentials are critical data assets in the IoT ecosystem. In “Administrative Interface,” one of OWASP IoT Attack Surface areas, what are three vulnerabilities these credential data assets may have? (Select three)

Lack of account lockout

Sent over HTTP

SQL Injection

Weak password policy

0 0
Add a comment Improve this question Transcribed image text
Answer #1

[1] Answer : True
Reason : Security risks in system of Internet of Things

[2]
Answer :
Conventional anti-virus or anti-spam schemes work well for IoT malware detection and prevention.
IoT malware has much less user interaction.
IoT malware is hard to kill due to lack of direct interface with the infected product.

[3]
Answer :
Identification, authentication and encryption
Remote control and update of devices

[4]
Answer : False

[5] Answer :
Ecosystem Access Control


[6]
Lack of account lockout
Sent over HTTP
Weak password policy

Add a comment
Know the answer?
Add Answer to:
Question 1 1 point possible (graded) True or False: Because IoT is an ecosystem, IoT Security...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Question 1 An edge controller is necessary in IoT because:    Security    Real-time response   ...

    Question 1 An edge controller is necessary in IoT because:    Security    Real-time response    Resiliency    Conserving bandwidth    All of the above Question 2 The cloud is attractive in IoT because:    Availability of computational resources    Security    A good design metaphor    All of the above Question 3 RFID took off in:    Groceries    Trucking    Clothing    Air transport Question 4 Passive RFID tags:    Draw power from a battery    Absorb energy...

  • its true or false questions 1. A computer security risk is any event or action that...

    its true or false questions 1. A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability 2. A cybercrime is an online or Internet-based illegal act 3. Information transmitted over networks has a higher degree of security risk than information kept on an organization's premises 4. Users can take several precautions to protect their home and work computers and mobile devices from these malicious...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • 1. Data management, device management and network management of IoT is crucial to data integrity and...

    1. Data management, device management and network management of IoT is crucial to data integrity and transmission. T F 2. An IoT application is a set of wireless devices that act together to perform some sensing and control function. Most applications also provide a user interface, such as a mobile app or cloud-based service. In general, each application is deployed independently of any other applications that may be operating in the area and forms its own separate, cryptographically isolated network....

  • Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion...

    Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion prevention system untouched. Performing cloud-based data loss prevention (DLP) is as simple as moving the enterprise edge methodology to the cloud. General UNIX baselining follows similar concepts as baselining for Windows OSs. Defense against attack begins by eliminating threats. A worm is malicious code that has to attach itself to something else to survive. With the availability of DNS blacklisting, pattern matching is no...

  • Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True...

    Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False Question 4 (1 point) In general, private key encryption is safer than public key encryption. Question 4 options: True False Question 5 (1 point) TLS will encrypt TCP/IP transmissions. Question 5...

  • Question 19 (1 point) True or false: The social security portion of FICA taxes is applied...

    Question 19 (1 point) True or false: The social security portion of FICA taxes is applied to all levels of income. True False Question 20 (1 point) What percentage of federal tax liability do U.S. households in the 5th and highest quintile pay? 69% 80% m 72% 45%

  • Please answer me as soon as possible Quiz Question 1 (1 point) Saved What metric is...

    Please answer me as soon as possible Quiz Question 1 (1 point) Saved What metric is used to measure bandwidth? Question 1 options: a. msec b. bit/sec c. bytes d. number of packets/sec Question 2 (1 point) Saved Ethernet is one of access network technologies. Question 2 options: True False Question 3 (1 point) Saved Consider two hosts, A and B, connected by a single link of rate R bps. Suppose that the two hosts are separated by m meters,...

  • QUESTION 1 . ______________ allow(s) a computer to invoke procedures that use resources on another computer...

    QUESTION 1 . ______________ allow(s) a computer to invoke procedures that use resources on another computer Pervasive computing Remote procedure calls (RPCs) Cloud computing Global computing QUESTION 2 The simplest example of a neural net is the: CPu perceptron systolic array supervised learning network QUESTION 3 The first company in the world to manufacture and sell what it identifies as a quantum computer is: D-Wave Computers Cray Google Intel QUESTION 4 A ______________ is a collection of distributed workstations that...

  • QUESTION 73 What AwS database service is used for data warehousing of petabytes of data? ORDS...

    QUESTION 73 What AwS database service is used for data warehousing of petabytes of data? ORDS Elasticache O Redshih DynamoDB QUESTION 74 What AWS tool compares the cost of running your application in an on-premises data center to AWS? Total Cost of Application (TCA) calculator Total Cost of Products (TCP) calculator Total Cost of Ownership (TCO) calculator Total Cost of Operation (TCO) calculator QUESTION 75 What SQL database engine options are available in RDS? (Choose 3 correct answers) MySQL MongoDB...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT