Ch. 16 Flashcards

1
Q

What refers to the network of devices with an IP address that have the capability of sensing, collecting, and sending data using embedded sensors, communication hardware, and processors?

A

Internet of Things (IoT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the IoT architecture layers?

A
  • Edge Technology Layer
  • Access Gateway Layer
  • Internet Layer
  • Middleware Layer
  • Application Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is one of the most critical layers in the two-way mode and sits in the middle of the application layer and the hardware layer, responsible for data management, device management, data analysis, data aggregation, data filtering, device information discovery, and access control?

A

Middleware layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is one of the crucial layers within the IoT architecture, as it serves as the main component in communicating between two end points and may also involve backend data sharing?

A

Internet layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In what attack can attackers connect to nearby devices and exploit the Bluetooth protocol vulnerabilities to compromise the device?

A

BlueBorne Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In what attack can attackers jam and sniff the signal to obtain the code transferred to the vehicle’s receiver and use it to unlock and steal the vehicle?

A

Rolling Code Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In what attack can attackers use multiple forged identities to create a strong illusion of traffic congestion, affecting communication between neighboring nodes and networks?

A

Sybil Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In what attack is a malicious script used to exploit poorly patched vulnerabilities in an IoT device?

A

Exploit Kits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are short ranged wireless connections that help the IoT devices interact with each other without the need for a constant power supply?

A

NFC connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which connections help determine the physical location of a smartwatch?

A

GPS connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Before conducting forensics investigation on an Android smartwatch, the investigator needs to understand the basic framework of that device. What are the Android APIs?

A
  • Message API
  • Node API
  • Data API
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What API manages all nodes that can be connected or disconnected on an Android smartwatch and the connected smart phone receives notifications with the help of this node whenever a new connection is established among the IoT devices?

A

Node API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

After establishing a connection to an Android smartwatch, the forensic investigators can perform a logical acquisition on the device using what command?

A

adb pull

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In Android devices, the Amazon Alexa application uses two SQLite files. Which file contains currently logged-in users in the Alexa device?

A

map_data_storage.db

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When a forensic investigator finds it difficult to perform data acquisition from the device at the software level, they use hardware-level acquisition methods to acquire raw data stored on a memory chip. What method allows investigators to create memory dumps of the device or perform physical acquisition of the device without removing the memory chips from the device’s motherboard?

A

JTAG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly