Module 18 - Iot and OT Hacking ( EC Mode ) Flashcards
Which of the following technologies is a short-range communication protocol based on the IEEE 203.15.4 standard and is used in devices that transfer data infrequently at a low rate in a restricted area, within a range of 10–100 m?
A. Wi-Fi Direct
B. BLE
C. Thread
D. Zigbee
Answer: D. Zigbee
Which of the following operating systems is used in low-power wireless devices such as street lighting and sound monitoring systems?
A. CoAP
B. Edge
C. Contiki
D. LWM2M
Answer: C. Contiki
Which of the following layers in the IoT architecture is responsible for important functions such as data management and device management as well as various issues such as data analysis, data aggregation, data filtering, device information discovery, and access control?
A. Middleware layer
B. Edge technology layer
C. Internet layer
D. Access gateway layer
Answer: A. Middleware layer.
Which of the following protocols is a type of LAN that consists of a wired connection between computers in a small building, office, or campus?
A. LTE-Advanced
B. Li-Fi
C. MQTT
D. Ethernet
Answer: D. Ethernet.
Which of the following IoT technology components bridges the gap between the IoT device and the end user?
A. IoT gateway
B. Remote control using mobile app
C. Sensing technology
D. Cloud server/data storage
Answer: A. IoT gateway
Which of the following IoT technology components collects data that undergoes data analysis, from the gateway?
A. Cloud server/data storage
B. Remote control using mobile app
C. Sensing technology
D. IoT gateway
Answer: A. Cloud server/data storage.
Which of the following IoT devices is included in the buildings service sector?
A. HVAC, transport, fire and safety, lighting, security, access, etc.
B. Turbines, windmills, UPS, batteries, generators, meters, drills, fuel cells, etc.
C. MRI, PDAs, implants, surgical equipment, pumps, monitors, telemedicine, etc.
D. Digital cameras, power systems, MID, e-readers, dishwashers, desktop computers, etc.
Answer: A. HVAC, transport, fire and safety, lighting, security, access, etc.
Which of the following long-range wireless communication protocols is used for data transfer through small dish antennas for both broadband and narrowband data?
A. VSAT
B. PLC
C. QUIC
D. NFC
Answer: A. VSAT.
Which of the following protocols is used to enable fast and seamless interaction with nearby IoT devices and reveals the list of URLs being broadcasted by nearby devices with BLE beacons?
A. XMPP
B. Physical Web
C. CoAP
D. LWM2M
Answer: B. Physical Web.
Which of the following IoT architecture layers consists of all the hardware parts like sensors, RFID tags, readers or other soft sensors, and the device itself?
A. Access gateway layer
B. Application layer
C. Internet layer
D. Edge technology layer
E. Middleware layer
Answer: D. Edge technology layer.
Which of the following IoT architecture layers carries out communication between two end points such as device-to-device, device-to-cloud, device-to-gateway, and back-end data-sharing?
A. Edge technology layer
B. Access gateway layer
C. Middleware layer
D. Internet layer
E. Application layer
Answer: D. Internet layer
In which of the following IoT communication models does a device upload its data to the cloud to be later accessed or analyzed by third parties?
A. Device-to-gateway communication model
B. Device-to-device communication model
C. Back-end data-sharing communication model
D. Device-to-cloud communication model
Answer: C. Back-end data-sharing communication model
What is the name of the communication model where IoT devices communicate with the cloud service through gateways?
A. Back-end data-sharing communication model
B. Device-to-device communication model
C. Device-to-cloud communication model
D. Device-to-gateway communication model
Answer: D. Device-to-gateway communication model.
Which of the following layers in the IoT architecture has security issues such as validation of the inputted string, AuthN, AuthZ, no automatic security updates, and default passwords?
A. Mobile
B. Application
C. Cloud
D. Network
Answer: B. Application.
Which of the following IoT attack surface areas has username enumeration, weak passwords, account lockout, known default credentials, and an insecure password recovery mechanism as its major vulnerabilities?
A. Device physical interfaces
B. Device web interface
C. Network traffic
D. Device firmware
Answer: B. Device web interface.
One of the following tools is used by attackers to obtain the rolling code sent by a victim to unlock a vehicle, which is later used for unlocking and stealing the vehicle. Which is this tool?
A. RFCrack
B. SearchDiggity
C. MultiPing
D. CyberX
Answer: A. RFCrack.
What is the name of the IoT security vulnerability that gives rise to issues such as weak credentials, lack of account lockout mechanism, and account enumeration?
A. Insecure web interface
B. Privacy concerns
C. Insecure network services
D. Insufficient authentication/authorization
Answer: A. Insecure web interface
In which of the following attacks does an attacker use a malicious script to exploit poorly patched vulnerabilities in an IoT device?
A. Side channel attack
B. Exploit kits
C. Replay attack
D. Sybil attack
Answer: B. Exploit kits.
What is the name of an attack where an attacker uses an army of botnets to target a single online service or system?
A. Side channel attack
B. DDoS attack
C. Sybil attack
D. Replay attack
Answer: B. DDoS attack.
What is the name of an attack where an attacker interrupts communication between two devices by using the same frequency signals on which the devices are communicating?
A. Man-in-the-middle attack
B. Side channel attack
C. Replay attack
D. Jamming attack
Answer: D. Jamming attack.
Given below are the various steps involved in the Enemybot malware attack. Identify the correct sequence of steps involved in the Enemybot malware attack.
- Gaining access
- Disabling other malware on the target
- Launching attack
- Persistence
- Creating exploits
A. 1 -> 2 -> 3 -> 4 -> 5
B. 5 -> 3 -> 4 -> 1 -> 2
C. 5 -> 2 -> 1 -> 3 -> 4
D. 3 -> 4 -> 5 -> 1 -> 2
Answer: C. 5 -> 2 -> 1 -> 3 -> 4
Identify the Enemybot malware attack stage in which it borrows modules such as scanner and bot killer from Mirai’s source code.
A. Creating exploits
B. Gaining access
C. Persistence
D. Launching attack
Answer: A. Creating exploits
Identify the Enemybot malware attack stage in which the malware targets multiple architectures to spread its infection.
A. Persistence
B. Launching attack
C. Creating exploits
D. Disabling other malware on the target
Answer: D. Disabling other malware on the target
Which of the following IoT threats is prone to various attacks such as buffer overflow that result in denial of service, leaving the device inaccessible to the user?
A. Insecure data transfer and storage
B. Insecure ecosystem interfaces
C. Insecure default settings
D. Insecure network services
Answer: D. Insecure network services.