Biometric Data
Passwords
Private data
backup
Auditing
Authorisation
Authentication
Accounting
TCP
HTTP
IP
FTP
HTTPS
SSL
SMTP
SFTP
DoS
DDoS
Brute force
Passive
Mirai botnet
cipher
Ethernet
Stuxnet
Experiment
Inquiry
Investigation
All of these
Subject
Body
Address
Salutation
XMPP
SPI
MQTT
Match the cryptographic attacks with their definitions.
1 → D, 2 → B, 3 → C, 4 →A
1 → C, 2 → A, 3 → B, 4 → D
1 → B, 2 → D, 3 → A, 4 → C
1 → A, 2 → D, 3 → B, 4 → C
Authoring
Authorization
32
64
8
16
NANO
STRIDE
OCTAVE
PASTA
e-Government related
Enterprise
company based
Business oriented plateform
Security
Signaling
Power Consumption
Presence Detection
Encryption
Decryption
Locking
Registering
Service as a software
Software as a service
Service as a service
None
Simplex
Duplex
Full-Duplex
None of these
DSL
W3C
MIT
Firewall
Protocol abstraction
Simple and fast installation
Security with hardware
Data storage
Systems
Devices
Networks
Services
Coulomb's Law
Lenz's Law
Fleming's Right-hand Rule
Fleming's Left-hand Rule
Standard
Regulation
Internet
Phishing
Surfing
Trojan horse
Eavesdropping
Match the following Internet security threats with their definitions.
A-1, B-2, C-3, D-4
A-4, B-3, C-1, D-2
A-3, B-4, C-2, D-1
A-2, B-1, C-4, D-3
Confidentiality
Integrity
Both of these
Sensors
Actuators
Smart Applications
All of the Above
avrgcc
g++
cpython
avrdude
Process
People
Things
Principle of least privilege
Defence in depth
Attack surface
None of the above
Spam
Injection
Spoofing
DoS attack
Availability
time slice
RMS
cooperative multitasking
pre-emptive
Cloud initiated communication
TLS / SSL
IPS (Instrusion Prevention System)
Firewalll
Asset
Vulnerability
Threat
Time
Eclipse Kura
Red Hat
Intercloud
Bot 2 Bot
Signal
Machine to machine
Interconnected
Network
Setting a selected bit of R
Clearing a selected bit of R
Complement selected bit of R
Transparent, slide
Translucent, transparency
Opaque, flip chart
Opaque, transparency
Smartphones
Tablet and PCs
Smart Watches
All of the above
name of spouse
Name of hobby
Contains multiple random digit with special charactor
Revealing
Wamp
Motes
Monitoring devices
Edge monitors
CPU, ROM, I/O ports and timers
RAM, ROM, 1/0 ports and timers
PU, RAM, 1/O ports and timers
CPU, RAM, ROM, I/O ports and timers
Port address
MAC address of Device
Unique identifier of the parameter
Unique identifier of the device
A router
A Firewall
A Network Protocol
Python Shell
Eelipse Kapua
Service provider
SaaS
IaaS