Security
Signaling
Power Consumption
Presence Detection
Cloud initiated communication
TLS / SSL
IPS (Instrusion Prevention System)
Firewalll
Service as a software
Software as a service
Service as a service
None
Auditing
Authorisation
Authentication
Accounting
CPU, ROM, I/O ports and timers
RAM, ROM, 1/0 ports and timers
PU, RAM, 1/O ports and timers
CPU, RAM, ROM, I/O ports and timers
Match the cryptographic attacks with their definitions.
1 → D, 2 → B, 3 → C, 4 →A
1 → C, 2 → A, 3 → B, 4 → D
1 → B, 2 → D, 3 → A, 4 → C
1 → A, 2 → D, 3 → B, 4 → C
Phishing
Surfing
DDoS
Revealing
Process
People
Things
Match the following Internet security threats with their definitions.
A-1, B-2, C-3, D-4
A-4, B-3, C-1, D-2
A-3, B-4, C-2, D-1
A-2, B-1, C-4, D-3
Confidentiality
Integrity
Availability
None of these
Darkmotel
Mirai
Petye
whitehorse
physical computing
chemical computing
mechanism
cloud computing
NANO
STRIDE
OCTAVE
PASTA
name of spouse
Name of hobby
Contains multiple random digit with special charactor
None of the above
Encryption
Decryption
Locking
Registering
Service provider
SaaS
IaaS
Sensors
Actuators
Smart Applications
All of the Above
32
64
8
16
A router
A Firewall
A Network Protocol
Python Shell
Principle of least privilege
Defence in depth
Attack surface
Port address
MAC address of Device
Unique identifier of the parameter
Unique identifier of the device
Smartphones
Tablet and PCs
Smart Watches
All of the above
Authoring
Authorization
avrgcc
g++
cpython
avrdude
Eclipse Kura
Red Hat
Intercloud
Bot 2 Bot
Biometric Data
Passwords
Private data
backup
Simplex
Duplex
Full-Duplex
TCP
HTTP
IP
FTP
Both of these
XMPP
SPI
MQTT
HTTPS
DREAD
OWASP
DAR
Protocol abstraction
Simple and fast installation
Security with hardware
Data storage
Subject
Body
Address
Salutation
Trojan horse
Wamp
Asset
Vulnerability
Threat
Time
Signal
Machine to machine
Interconnected
Network
time slice
RMS
cooperative multitasking
pre-emptive
Eavesdropping
Coulomb's Law
Lenz's Law
Fleming's Right-hand Rule
Fleming's Left-hand Rule
Transparent, slide
Translucent, transparency
Opaque, flip chart
Opaque, transparency
Setting a selected bit of R
Clearing a selected bit of R
Complement selected bit of R
Power Detection
Power Consunmption
Improve usability and interoperability
Reduce the security
Complicate the development
Increase the cost
Request-response model
Push-pull model
Publish-subscribe model
All of these
SSL
SMTP
SFTP
e-Government related
Enterprise
company based
Business oriented plateform
Experiment
Inquiry
Investigation
Motes
Monitoring devices
Edge monitors
Eelipse Kapua