Module 18 - Iot and OT Hacking ( EC Mode ) Flashcards
Which of the following technologies is a short-range communication protocol based on the IEEE 203.15.4 standard and is used in devices that transfer data infrequently at a low rate in a restricted area, within a range of 10–100 m?
A. Wi-Fi Direct
B. BLE
C. Thread
D. Zigbee
Answer: D. Zigbee
Which of the following operating systems is used in low-power wireless devices such as street lighting and sound monitoring systems?
A. CoAP
B. Edge
C. Contiki
D. LWM2M
Answer: C. Contiki
Which of the following layers in the IoT architecture is responsible for important functions such as data management and device management as well as various issues such as data analysis, data aggregation, data filtering, device information discovery, and access control?
A. Middleware layer
B. Edge technology layer
C. Internet layer
D. Access gateway layer
Answer: A. Middleware layer.
Which of the following protocols is a type of LAN that consists of a wired connection between computers in a small building, office, or campus?
A. LTE-Advanced
B. Li-Fi
C. MQTT
D. Ethernet
Answer: D. Ethernet.
Which of the following IoT technology components bridges the gap between the IoT device and the end user?
A. IoT gateway
B. Remote control using mobile app
C. Sensing technology
D. Cloud server/data storage
Answer: A. IoT gateway
Which of the following IoT technology components collects data that undergoes data analysis, from the gateway?
A. Cloud server/data storage
B. Remote control using mobile app
C. Sensing technology
D. IoT gateway
Answer: A. Cloud server/data storage.
Which of the following IoT devices is included in the buildings service sector?
A. HVAC, transport, fire and safety, lighting, security, access, etc.
B. Turbines, windmills, UPS, batteries, generators, meters, drills, fuel cells, etc.
C. MRI, PDAs, implants, surgical equipment, pumps, monitors, telemedicine, etc.
D. Digital cameras, power systems, MID, e-readers, dishwashers, desktop computers, etc.
Answer: A. HVAC, transport, fire and safety, lighting, security, access, etc.
Which of the following long-range wireless communication protocols is used for data transfer through small dish antennas for both broadband and narrowband data?
A. VSAT
B. PLC
C. QUIC
D. NFC
Answer: A. VSAT.
Which of the following protocols is used to enable fast and seamless interaction with nearby IoT devices and reveals the list of URLs being broadcasted by nearby devices with BLE beacons?
A. XMPP
B. Physical Web
C. CoAP
D. LWM2M
Answer: B. Physical Web.
Which of the following IoT architecture layers consists of all the hardware parts like sensors, RFID tags, readers or other soft sensors, and the device itself?
A. Access gateway layer
B. Application layer
C. Internet layer
D. Edge technology layer
E. Middleware layer
Answer: D. Edge technology layer.
Which of the following IoT architecture layers carries out communication between two end points such as device-to-device, device-to-cloud, device-to-gateway, and back-end data-sharing?
A. Edge technology layer
B. Access gateway layer
C. Middleware layer
D. Internet layer
E. Application layer
Answer: D. Internet layer
In which of the following IoT communication models does a device upload its data to the cloud to be later accessed or analyzed by third parties?
A. Device-to-gateway communication model
B. Device-to-device communication model
C. Back-end data-sharing communication model
D. Device-to-cloud communication model
Answer: C. Back-end data-sharing communication model
What is the name of the communication model where IoT devices communicate with the cloud service through gateways?
A. Back-end data-sharing communication model
B. Device-to-device communication model
C. Device-to-cloud communication model
D. Device-to-gateway communication model
Answer: D. Device-to-gateway communication model.
Which of the following layers in the IoT architecture has security issues such as validation of the inputted string, AuthN, AuthZ, no automatic security updates, and default passwords?
A. Mobile
B. Application
C. Cloud
D. Network
Answer: B. Application.
Which of the following IoT attack surface areas has username enumeration, weak passwords, account lockout, known default credentials, and an insecure password recovery mechanism as its major vulnerabilities?
A. Device physical interfaces
B. Device web interface
C. Network traffic
D. Device firmware
Answer: B. Device web interface.
One of the following tools is used by attackers to obtain the rolling code sent by a victim to unlock a vehicle, which is later used for unlocking and stealing the vehicle. Which is this tool?
A. RFCrack
B. SearchDiggity
C. MultiPing
D. CyberX
Answer: A. RFCrack.
What is the name of the IoT security vulnerability that gives rise to issues such as weak credentials, lack of account lockout mechanism, and account enumeration?
A. Insecure web interface
B. Privacy concerns
C. Insecure network services
D. Insufficient authentication/authorization
Answer: A. Insecure web interface
In which of the following attacks does an attacker use a malicious script to exploit poorly patched vulnerabilities in an IoT device?
A. Side channel attack
B. Exploit kits
C. Replay attack
D. Sybil attack
Answer: B. Exploit kits.
What is the name of an attack where an attacker uses an army of botnets to target a single online service or system?
A. Side channel attack
B. DDoS attack
C. Sybil attack
D. Replay attack
Answer: B. DDoS attack.
What is the name of an attack where an attacker interrupts communication between two devices by using the same frequency signals on which the devices are communicating?
A. Man-in-the-middle attack
B. Side channel attack
C. Replay attack
D. Jamming attack
Answer: D. Jamming attack.
Given below are the various steps involved in the Enemybot malware attack. Identify the correct sequence of steps involved in the Enemybot malware attack.
- Gaining access
- Disabling other malware on the target
- Launching attack
- Persistence
- Creating exploits
A. 1 -> 2 -> 3 -> 4 -> 5
B. 5 -> 3 -> 4 -> 1 -> 2
C. 5 -> 2 -> 1 -> 3 -> 4
D. 3 -> 4 -> 5 -> 1 -> 2
Answer: C. 5 -> 2 -> 1 -> 3 -> 4
Identify the Enemybot malware attack stage in which it borrows modules such as scanner and bot killer from Mirai’s source code.
A. Creating exploits
B. Gaining access
C. Persistence
D. Launching attack
Answer: A. Creating exploits
Identify the Enemybot malware attack stage in which the malware targets multiple architectures to spread its infection.
A. Persistence
B. Launching attack
C. Creating exploits
D. Disabling other malware on the target
Answer: D. Disabling other malware on the target
Which of the following IoT threats is prone to various attacks such as buffer overflow that result in denial of service, leaving the device inaccessible to the user?
A. Insecure data transfer and storage
B. Insecure ecosystem interfaces
C. Insecure default settings
D. Insecure network services
Answer: D. Insecure network services.
In which of the following IoT attacks does an attacker extract information about encryption keys by observing the emission of signals?
A. Exploit kits
B. Side-channel attack
C. Sybil attack
D. DNS rebinding attack
Answer: B. Side-channel attack.
What is the name of the code that is used in locking or unlocking a car or a garage and prevents replay attacks?
A. Polymorphic code
B. Rolling code
C. Unicode
D. Hex code
Answer: B. Rolling code.
Identify the Mirai-based malware that has been proliferating by exploiting weaknesses in IoT to hijack the computational resources of IoT devices and has been using them for DDoS and crypto-mining attacks.
A. EquationDrug
B. BitCrypter
C. Enemybot
D. IExpress Wizard
Answer: C. Enemybot.
In which of the following attack stages does Enemybot malware obfuscate its strings using several techniques such as XOR encoding?
A. Gaining access
B. Persistence
C. Launching attack
D. Disabling other malware on the target
Answer: B. Persistence
In which of the following attacks does an attacker use multiple forged identities to create a strong illusion of traffic congestion, affecting communication between neighboring nodes and networks?
A. Rolling code attack
B. Replay attack
C. Sybil attack
D. DoS attack
Answer: C. Sybil attack.
A. Rolling code attack: This is a type of attack that targets systems that use rolling codes for security purposes. Rolling codes are commonly used in devices such as garage door openers and car key fobs to prevent unauthorized access. In a rolling code attack, an attacker intercepts a valid rolling code and then replays it later to gain access to the system.
B. Replay attack: This is a type of attack in which an attacker intercepts valid data transmissions and then replays them later to gain unauthorized access. This type of attack is commonly used against authentication systems that rely on messages exchanged between a client and a server. By intercepting and replaying these messages, the attacker can impersonate the client and gain access to the system.
C. Sybil attack: This is a type of attack in which an attacker creates multiple identities or personas to manipulate a network or system. The goal of a Sybil attack is to overwhelm a network or system with fake identities in order to gain control or influence over it. This type of attack is commonly used in peer-to-peer networks and online communities.
D. DoS attack: A Denial-of-Service (DoS) attack is a type of attack in which an attacker attempts to disrupt the normal functioning of a network, system or website by overwhelming it with traffic or requests. The goal of a DoS attack is to make the system unavailable to legitimate users. This type of attack can be carried out using a variety of methods, including flooding the target with traffic, exploiting vulnerabilities in the system, or using botnets to coordinate the attack.
Which of the following tools uses sniffers to capture 6LoWPAN traffic and RPL-related information and identify abnormal behaviors in IoT traffic?
A. Nmap
B. RIoT Vulnerability Scanner
C. Foren6
D. Censys
Answer: C. Foren6
Given below are the steps used by the attackers to perform firmware analysis and reverse engineering.
1.Extract the file system
2. Emulate firmware for dynamic testing
3. Obtain firmware
4. Analyze the file-system content
5. Mount the file system
6. Analyze firmware
What is the correct sequence of steps used by attackers to perform firmware analysis and reverse engineering?
A. 3 -> 6 -> 1 -> 5 -> 4 -> 2
B. 2 -> 1 -> 5 -> 3 -> 4 -> 6
C. 5 -> 6 -> 3 -> 1 -> 4 -> 2
D. 3 -> 1 -> 6 -> 5 -> 2 -> 4
Answer: A. 3 -> 6 -> 1 -> 5 -> 4 -> 2
Which of the following Nmap commands is used by an attacker to identify the IPv6 capabilities of a target IoT device?
A. nmap -n -Pn -sSU -pT:0-65535,U:0-65535 -v -A -oX
B. nmap -6 -n -Pn -sSU -pT:0-65535,U:0-65535 -v -A -oX
C. nmap -p 80,81,8080,8081
D. nmap -n -Pn -sS -pT:0-65535 -v -A -oX
Answer: B. nmap -6 -n -Pn -sSU -pT:0-65535,U:0-65535 -v -A -oX
In which of the following phases of IoT hacking is information such as IP address, protocols used, open ports, device type, and geo-location of a device extracted by an attacker?
A. Vulnerability Scanning
B. Gain Access
C. Launch Attacks
D. Information Gathering
Answer: D. Information Gathering
Once an attacker gathers information about a target device in the first phase, what is the second phase in IoT device hacking?
A. Gain Access
B. Vulnerability Scanning
C. Maintain Access
D. Information Gathering
Answer: B. Vulnerability Scanning