DoS
DDoS
Brute force
Passive
Protocol abstraction
Simple and fast installation
Security with hardware
Data storage
Transparent, slide
Translucent, transparency
Opaque, flip chart
Opaque, transparency
XMPP
SPI
MQTT
HTTPS
Experiment
Inquiry
Investigation
All of these
Simplex
Duplex
Full-Duplex
None of these
Match the following Internet security threats with their definitions.
A-1, B-2, C-3, D-4
A-4, B-3, C-1, D-2
A-3, B-4, C-2, D-1
A-2, B-1, C-4, D-3
SSL
SMTP
SFTP
Improve usability and interoperability
Reduce the security
Complicate the development
Increase the cost
Biometric Data
Passwords
Private data
backup
Phishing
Surfing
Revealing
CPU, ROM, I/O ports and timers
RAM, ROM, 1/0 ports and timers
PU, RAM, 1/O ports and timers
CPU, RAM, ROM, I/O ports and timers
Smartphones
Tablet and PCs
Smart Watches
All of the above
Service provider
SaaS
IaaS
None
Trojan horse
Eavesdropping
Authentication
Authoring
Authorization
Accounting
TCP
HTTP
IP
FTP
Signaling
Security
Power Detection
Power Consunmption
Setting a selected bit of R
Clearing a selected bit of R
Complement selected bit of R
Request-response model
Push-pull model
Publish-subscribe model
Systems
Devices
Networks
Services
Spam
Injection
Spoofing
DoS attack
Principle of least privilege
Defence in depth
Attack surface
None of the above
Things
Motes
Monitoring devices
Edge monitors
Confidentiality
Integrity
Both of these
Mirai botnet
cipher
Ethernet
Stuxnet
Auditing
Authorisation
Asset
Vulnerability
Threat
Time
Availability
avrgcc
g++
cpython
avrdude
DREAD
OWASP
STRIDE
DAR
Sensors
Actuators
Smart Applications
All of the Above
A router
A Firewall
A Network Protocol
Python Shell
Match the cryptographic attacks with their definitions.
1 → D, 2 → B, 3 → C, 4 →A
1 → C, 2 → A, 3 → B, 4 → D
1 → B, 2 → D, 3 → A, 4 → C
1 → A, 2 → D, 3 → B, 4 → C
Subject
Body
Address
Salutation
e-Government related
Enterprise
company based
Business oriented plateform
Encryption
Decryption
Locking
Registering
Standard
Regulation
Internet
Eelipse Kapua
Red Hat
Intercloud
Eclipse Kura
name of spouse
Name of hobby
Contains multiple random digit with special charactor
Virus
Natural Disaster
Wamp
Cloud initiated communication
TLS / SSL
IPS (Instrusion Prevention System)
Firewalll
Bot 2 Bot
time slice
RMS
cooperative multitasking
pre-emptive
Service as a software
Software as a service
Service as a service
Port address
MAC address of Device
Unique identifier of the parameter
Unique identifier of the device
32
64
8
16
Coulomb's Law
Lenz's Law
Fleming's Right-hand Rule
Fleming's Left-hand Rule