IOT_CHFI Flashcards

CHFI certificate

1
Q

Access Gateway Layer

A

This layer helps bridge the gap between two end points, such as a device and a client. The very first data handling also takes place in this layer. It carries out message routing, message identification, and subscription.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Android wear pair device

A
  1. Enable developer options on the smartwatch
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

application

A

Validation of the inputted string, AuthN, AuthZ, no automatic security updates, default passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cloud

A

Improper authentication, no encryption for storage and communications, insecure web interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

complications.db

A

Contains complications display information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

cross-site request forgery (XSRF)

A

is a type of attack in which a malicious web site, blog, instant message, or program causes a user’s web browser to behave abnormally on a trusted site for which the user is authenticated at that moment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cross-Site Scripting (XSS)

A

is a type of attack on web applications, using which an attacker can inject malicious code into the application to obtain unauthorized access to the web application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data API

A

This API helps the data sync with the smartphone; once synced, the data is automatically transferred among the two devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DataStore.db

A

Contains to-do lists and shopping lists that are acquired using the todos API from cloud services and client centric applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DDoS attack on IoT device steps

A
  1. Attacker gains remote access to vulnerable devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DDoS attack

A

attack is a type of attack where multiple infected systems are used to pound a single online system or service, thereby making the server useless, slow, and unavailable for a legitimate user for a short period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Edge Technology Layer

A

This layer consists of all the hardware components, including sensors, radio-frequency identification (RFID) tags, readers, or other soft sensors, and the device itself. These entities are the primary part of the data sensors that are deployed in the field for monitoring or sensing various phenomena. This layer plays an important part in data collection, and in connecting devices within the network and with the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Forged Malicious Device

A

Attackers replace authentic IoT devices with malicious devices if they have physical access to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

GPS connections

A

help determine the physical location of a smartwatch. A smartwatch can obtain satellite signals and help determine the exact location of the user of that watch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

gservices.db

A

Contains information related to Google Service Frameworks for Android.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Internet Layer

A

one of the crucial layers within the IoT architecture, as it serves as the main component in communicating between two end points. The communication can be between two devices, or any device connected to a cloud, or between a device and any local gateway service; it may also involve backend data sharing.

17
Q

man-in-the-middle attack

A

An attacker pretends to be a legitimate sender who intercepts all communication between the sender and receiver and hijacks the communication.

18
Q

Map_data_storage.db

A

Contains currently logged-in users in the Alexa device, and whenever a user signs out, the data in the database is erased; however, the deleted records can be recovered from the SQLite database and its journal file.

19
Q

Message API

A

This API manages call, messages, and emails by sending a small payload to the connected smartphone

20
Q

Middleware Layer

A

This is one of the most critical layers in the two-way mode. As the name suggests, this layer sits in the middle of the application layer and the hardware layer, thus behaving as an interface between these two layers. It is responsible for important functions such as data management, device management, and various issues such as data analysis, data aggregation, data filtering, device information discovery, and access control.

21
Q

mobile

A

Insecure API, lack of communication channels encryption, authentication, and lack of storage security

22
Q

Network

A

Firewall, improper communications encryption, services, lack of automatic updates

23
Q

Node API

A

This API manages all nodes that can be connected or disconnected on the smartwatch. The connected smart phone receives notifications with the help of the node API whenever a new connection is established among the IoT devices.

24
Q

Replay Attack

A

attackers intercept legitimate messages from a valid communication and continuously send the intercepted message to the target device to perform a denial-of-service attack or delay it in order to manipulate the message or crash the target device.

25
Q

Rolling Code Attack

A
  1. Victim presses car remote button and tries to unlock the car
26
Q

Side Channel Attack

A

attack by extracting information on encryption keys by observing the emission of signals, that is, “side channels” from IoT devices. All devices emit these signals that provide information about the internal computing process either by power consumption or electromagnetic emanations.

27
Q

SQL injection

A

is a code injection technique where a malicious code is injected in the application to extract and modify the database content.

28
Q

Sybil Attack

A

An attacker uses multiple forged identities to create a strong illusion of traffic congestion, affecting communication between neighboring nodes and networks.

29
Q

User Enumeration

A

is a technique in which an attacker finds out whether some username is already existing or not with the help of forgot password form. Once a set of existing or valid usernames are obtained, they can be used to obtain further access to their accounts.