XMPP
SPI
MQTT
HTTPS
Cloud initiated communication
TLS / SSL
IPS (Instrusion Prevention System)
Firewalll
Signal
Machine to machine
Interconnected
Network
name of spouse
Name of hobby
Contains multiple random digit with special charactor
None of the above
Systems
Devices
Networks
Services
Auditing
Authorisation
Authentication
Accounting
DSL
W3C
MIT
Firewall
Protocol abstraction
Simple and fast installation
Security with hardware
Data storage
Match the cryptographic attacks with their definitions.
1 → D, 2 → B, 3 → C, 4 →A
1 → C, 2 → A, 3 → B, 4 → D
1 → B, 2 → D, 3 → A, 4 → C
1 → A, 2 → D, 3 → B, 4 → C
Phishing
Surfing
Trojan horse
Wamp
avrgcc
g++
cpython
avrdude
Experiment
Inquiry
Investigation
All of these
Setting a selected bit of R
Clearing a selected bit of R
Complement selected bit of R
None of these
e-Government related
Enterprise
company based
Business oriented plateform
Security
Process
People
Things
Mirai botnet
cipher
Ethernet
Stuxnet
DREAD
OWASP
STRIDE
DAR
Confidentiality
Integrity
Availability
SSL
SMTP
SFTP
Service as a software
Software as a service
Service as a service
None
Encryption
Decryption
Locking
Registering
Eclipse Kura
Red Hat
Intercloud
Bot 2 Bot
Service provider
SaaS
IaaS
Biometric Data
Passwords
Private data
backup
DDoS
Revealing
NANO
OCTAVE
PASTA
32
64
8
16
time slice
RMS
cooperative multitasking
pre-emptive
Transparent, slide
Translucent, transparency
Opaque, flip chart
Opaque, transparency
DoS
Brute force
Passive
CPU, ROM, I/O ports and timers
RAM, ROM, 1/0 ports and timers
PU, RAM, 1/O ports and timers
CPU, RAM, ROM, I/O ports and timers
Sensors
Actuators
Smart Applications
All of the Above
TCP
HTTP
IP
FTP
Match the following Internet security threats with their definitions.
A-1, B-2, C-3, D-4
A-4, B-3, C-1, D-2
A-3, B-4, C-2, D-1
A-2, B-1, C-4, D-3
Eelipse Kapua
Darkmotel
Mirai
Petye
whitehorse
Coulomb's Law
Lenz's Law
Fleming's Right-hand Rule
Fleming's Left-hand Rule
Both of these
Signaling
Power Detection
Power Consunmption
Authoring
Authorization
Smartphones
Tablet and PCs
Smart Watches
All of the above
Principle of least privilege
Defence in depth
Attack surface
Subject
Body
Address
Salutation
Motes
Monitoring devices
Edge monitors
Virus
Natural Disaster
Spoofing
physical computing
chemical computing
mechanism
cloud computing
A router
A Firewall
A Network Protocol
Python Shell
Simplex
Duplex
Full-Duplex
Standard
Regulation
Internet