Iot Fundamentals: Iot Security Final (Eoc) Assessment Answers

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

IOT FUNDAMENTALS : IOT SECURITY FINAL (EOC) ASSESSMENT ANSWERS

1-Which type of access control model assigns security level labels to information and is typically used
in military or mission critical applications ?

Attribute-based

2-What are two attributes of IoT that make applying traditional security methods challenging?
(Choose Two)

Decentralized topologies

Limited device resources

3-A security researcher has completed a vulnerability assessment and has documented a list of
vulnerabilities. When performing risk assessment,what should these documented items be
translated into?

Risks

4-An IoT devices uses BusyBox. What is the purpose of entering the busybox command in the
command line ?

To see the list of avaliable commands

5-Which technology type describes a refrigerator that has become part of botnet that I attacking
businesses ?

Consumer technology

6-Why are most IoT devices not directly connected to a Wi-Fi access point or router ?

Security and encryption constraints

7-Why do some IoT devices rely on gateways for the internet connection ?

Many Iot devices do not support a full TCP/IP stack


8-A threat actor has intercepted security keys that are used to establish communications.Which
popular remote exploit was used by the threat actor ?

Eavesdropping attack

9-What are three technologies used by blockchain ? (choose three)

Descentralized ledger

Digital signature

Algorithm for reaching consensus

10-Which IoT technology commonly benefits from the deployment of a star topology ?

Home automation

11-What is one of the most widely exposed vulnerabilities listed by the Open Web Applications
Security Project (OWASP) ?

Phishing

12-Which two types of IoT firmware vulnerabilities are caused by the use of default or weak login
credentials ?(choose two )

Distributed denial of Service (DDoS)

Default Credentials

13-When comparing the OSI and the IoT reference models, what is the intent of the IoT reference
model ?

Provide common terminology and help clarify how information flows and is processed for a
unified IoT industry

14-A threat actor wants to interrupt a normal TCP communication between two hosts by sending a
spoofed packet to both endpoints. Which TCP option bit would the threat actor set in the spoofed
packet ?

ACK
15-A network security engineer is reviewing security logs and notices an unauthorized device
sending authenticated messages that accured during a previous M2M session.Which basic security
service would protect against this type of incident?

Replay protection

16-Put the steps in the Threat Modeling process into the correct order

Step 1---Identify security objectives

Step 2---Document the IoT system architecture

Step 3---Decompose the IoT system

Step 4---Identify and rate threats

Step 5---Recommend mitigation

17-Which two CPU types are based on the Complex Instruction Set Computing architecture?(choose
two)

AMD

INTEL

18-Which type of IoT wireless network would use ruggedized network components to interconnect
sensors and actuators at dispersed locations in challenging manufacturing environments ?

Wireless field-area network

19-A user is concerned that the SD Card in surveillance cameras could be stolen or destroyed by an
attacker.Which security measure can help protect the surveillance cameras?

Tamper proof enclosure

20-

GPS---location service

SENSOR---heart rate detection

ACCELEROMETER----motion detection

21- In the context of the importance of security in IoT networks, which model provides a common
frameworks for understanding the placement of various standards and protocols in an IoT system?

ETSI
22-What are three best practices used to mitigate xss attacks? (choose three)

Escaping

Validating input

Sanitizing

23-Which technology type includes industrial control systems such as SCADA?

Operational technology

24-What are three potential vulnerabilities related to attacks toward the memory of an IoT device ?

Encryption key

Sensitive data

Clear-text authentication credential

25-A manufacturing organization is generating a large amount of data via their IoT sensors.At which
location should the data be processed if it is to be processed close to the ground where the IoT
sensors are connected to the network?

Mist

26-What is the intent of a threat actor that is performing a port scan against a targeted device ?

To check if certain application protocols are enabled

27-What is the challenge that must be overcome with symmetric key or cryptography ?

Having the sender and receiver agree on the same secret key without anyone intercepting it

28-Which type of address spoofing is typically in DOS attacks ?

Destination ip address spoofing


29-Which CVSS metric group contains metrics set by end users ?

Base metric group

30-For the I0T reference model ,what are two security measures that should be considered ?(choose
Tw0)

The hardware and software of each device connected to the IoT network should be secured.

The movement of data and communications between each level should be secured

31-Match the IoT standard or protocol with a category.

Applications--------CoAP , Zigbee

Communications Network ----------thread, RPL

Devices ------- 6LoWPAN , IEEE 802.15.4

32-What are three variables used by DREAD ?(choose three)

Damage

Exploitability

Affected users

33-What is the goal of a threat actor when performing a DoS attack ?

To prevent legitimate users from accessing online services

34-Which measure should be taken to defeat a brute force attack?

Only allow a limited number of authentication failures before an account is locked out

35-When creating devices for the home IoT market ,what are vendors commonly sacrificing in order
to provide simplicity of setup and administration ?

Security

36-Match the security requirement with the appropriate layer of the IoT functional model.

Device Layer --------- Secure boot and system integrity

Hardened and secure systems


Communication Layer ------------------ Secure communications

Application Layer ------ Secure web interfaces

Secure firmware and operating system updates

No default or weak credentials

37-Which technology is used to secure IoT transactions ?

Blockchain

38-A threat actor uses a newly discovered vulnerability to access the home wireless router of a user.
The threat actor then changes the password for the wireless network served by the router and
causes all wireless devices to lose connectivity. Which factor of smart home security is affected by
this attack?

Firmware

39-What is a local exploit used by threat actors ?

Device cloning

40-Which statement describes a security vulnerability of using a medical device on a legacy


computer system In a hospital ?

The OS of the PC may not receive up-to-date security patches

41-What are two OWASP communication layer vulnerabilities commonly found when securing the
IoT device network services attack surface ?(choose two.)

Poorly implemented encryption

Lack of payload verification

42-In a typical smart home setup which two devices directly share the cable signal from the local
cable service provider? (choose two)

TV

Cable modem
43-According to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce
by NIST, which work role in the Vulnerability Assessment and Management specialty area performs
assessments of IT systems and identifies where those systems deviate from acceptable
configurations or policy?

Vulnerability Assessment Analyst

44-A threat actor has used malicious commands to trick the database into returning unauthorized
record and other data. Which web front-end vulnerability is the threat actor exploiting?

Cross-site scripting

45-According to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce
Framework by NIST, which work role in the risk management speciality area conducts
comprehensive assessments of the management ,operational, and technical security controls to
determine their overall effectiveness?

Security Control Assessor

46-What are three items that should be included in the documentation describing the components
of the IoT system at each layer? (choose three)

Devices

Communications network

Applications

47-Which DFD symbol represents data output from sensing, actuating, traffic forwarding, analysis
and control systems?

Process

48-Which programming language is an example of an interpreted language ?

Python

49-Match the question to one of the three contributors to the determination of risk when
performing a risk assessment.

Asset --- how would the organization be affected by successful attacks ?

Threat – What is the likelihood that different attacks will occur ?


Vulnerability --- What are weaknesses in the current security policy ?

50-What process is used by blockchain technology to validate transactions

Proof of work

You might also like