Professional Documents
Culture Documents
True or False
True or False
11. During the last two decades, the attackers' capability level has increased. True
12. Password guessing is an example of IoT attacks. False
13. DoS, phishing and encryption are examples of network attacks. False
14. In recent days, requirements on attackers' capabilities are low. True
15. As requirements on attackers' capabilities are decreasing, attackers' capability
level is decreasing as well. False
16. AI-based attacks and ransomware viruses are examples of attack tools developed
in the 2010s. True
17. 3T+1M means 3 security tires and 1 management layer. False
18. Anti-DDoS and signaling storms are part of the pipe security. True
19. A priority-based system is an anti-DDoS tool. True
20. The two-factor authentication can include: certificate and password. True
True
20. The IoT platform cloud-based architecture is flexible but not scalable.False
15. Huawei LiteOS includes multiple kernels and one middleware. False