Ch. 16 Flashcards
What refers to the network of devices with an IP address that have the capability of sensing, collecting, and sending data using embedded sensors, communication hardware, and processors?
Internet of Things (IoT)
What are the IoT architecture layers?
- Edge Technology Layer
- Access Gateway Layer
- Internet Layer
- Middleware Layer
- Application Layer
What is one of the most critical layers in the two-way mode and sits in the middle of the application layer and the hardware layer, responsible for data management, device management, data analysis, data aggregation, data filtering, device information discovery, and access control?
Middleware layer
What is one of the crucial layers within the IoT architecture, as it serves as the main component in communicating between two end points and may also involve backend data sharing?
Internet layer
In what attack can attackers connect to nearby devices and exploit the Bluetooth protocol vulnerabilities to compromise the device?
BlueBorne Attack
In what attack can attackers jam and sniff the signal to obtain the code transferred to the vehicle’s receiver and use it to unlock and steal the vehicle?
Rolling Code Attack
In what attack can attackers use multiple forged identities to create a strong illusion of traffic congestion, affecting communication between neighboring nodes and networks?
Sybil Attack
In what attack is a malicious script used to exploit poorly patched vulnerabilities in an IoT device?
Exploit Kits
What are short ranged wireless connections that help the IoT devices interact with each other without the need for a constant power supply?
NFC connection
Which connections help determine the physical location of a smartwatch?
GPS connections
Before conducting forensics investigation on an Android smartwatch, the investigator needs to understand the basic framework of that device. What are the Android APIs?
- Message API
- Node API
- Data API
What API manages all nodes that can be connected or disconnected on an Android smartwatch and the connected smart phone receives notifications with the help of this node whenever a new connection is established among the IoT devices?
Node API
After establishing a connection to an Android smartwatch, the forensic investigators can perform a logical acquisition on the device using what command?
adb pull
In Android devices, the Amazon Alexa application uses two SQLite files. Which file contains currently logged-in users in the Alexa device?
map_data_storage.db
When a forensic investigator finds it difficult to perform data acquisition from the device at the software level, they use hardware-level acquisition methods to acquire raw data stored on a memory chip. What method allows investigators to create memory dumps of the device or perform physical acquisition of the device without removing the memory chips from the device’s motherboard?
JTAG