Darkmotel
Mirai
Petye
whitehorse
Match the cryptographic attacks with their definitions.
1 → D, 2 → B, 3 → C, 4 →A
1 → C, 2 → A, 3 → B, 4 → D
1 → B, 2 → D, 3 → A, 4 → C
1 → A, 2 → D, 3 → B, 4 → C
Confidentiality
Integrity
Availability
None of these
CPU, ROM, I/O ports and timers
RAM, ROM, 1/0 ports and timers
PU, RAM, 1/O ports and timers
CPU, RAM, ROM, I/O ports and timers
Authentication
Authoring
Authorization
Accounting
DREAD
OWASP
STRIDE
DAR
avrgcc
g++
cpython
avrdude
Cloud initiated communication
TLS / SSL
IPS (Instrusion Prevention System)
Firewalll
Biometric Data
Passwords
Private data
backup
Simplex
Duplex
Full-Duplex
Spam
Injection
Spoofing
DoS attack
TCP
HTTP
IP
FTP
Asset
Vulnerability
Threat
Time
name of spouse
Name of hobby
Contains multiple random digit with special charactor
None of the above
Improve usability and interoperability
Reduce the security
Complicate the development
Increase the cost
physical computing
chemical computing
mechanism
cloud computing
Standard
Security
Regulation
Internet
DoS
DDoS
Brute force
Passive
Experiment
Inquiry
Investigation
All of these
Things
Motes
Monitoring devices
Edge monitors
Signaling
Power Consumption
Presence Detection
Protocol abstraction
Simple and fast installation
Security with hardware
Data storage
Transparent, slide
Translucent, transparency
Opaque, flip chart
Opaque, transparency
Eelipse Kapua
Red Hat
Intercloud
Eclipse Kura
NANO
OCTAVE
PASTA
Match the following Internet security threats with their definitions.
A-1, B-2, C-3, D-4
A-4, B-3, C-1, D-2
A-3, B-4, C-2, D-1
A-2, B-1, C-4, D-3
32
64
8
16
Coulomb's Law
Lenz's Law
Fleming's Right-hand Rule
Fleming's Left-hand Rule
Signal
Machine to machine
Interconnected
Network
Phishing
Surfing
Trojan horse
Eavesdropping
Process
People
Port address
MAC address of Device
Unique identifier of the parameter
Unique identifier of the device
XMPP
SPI
MQTT
HTTPS
Bot 2 Bot
e-Government related
Enterprise
company based
Business oriented plateform
Auditing
Authorisation
DSL
W3C
MIT
Firewall
Encryption
Decryption
Locking
Registering
Service provider
SaaS
IaaS
None
Revealing
Systems
Devices
Networks
Services
A router
A Firewall
A Network Protocol
Python Shell
Principle of least privilege
Defence in depth
Attack surface
Virus
Natural Disaster
All of the above
Both of these
Sensors
Actuators
Smart Applications
All of the Above
Mirai botnet
cipher
Ethernet
Stuxnet
Request-response model
Push-pull model
Publish-subscribe model
time slice
RMS
cooperative multitasking
pre-emptive