Service as a software
Software as a service
Service as a service
None
Signal
Machine to machine
Interconnected
Network
Request-response model
Push-pull model
Publish-subscribe model
All of these
32
64
8
16
Simplex
Duplex
Full-Duplex
None of these
Principle of least privilege
Defence in depth
Attack surface
None of the above
Confidentiality
Integrity
Availability
DREAD
OWASP
STRIDE
DAR
Eelipse Kapua
Red Hat
Intercloud
Eclipse Kura
Spam
Injection
Spoofing
DoS attack
Authentication
Authoring
Authorization
Accounting
Both of these
Improve usability and interoperability
Reduce the security
Complicate the development
Increase the cost
Darkmotel
Mirai
Petye
whitehorse
Port address
MAC address of Device
Unique identifier of the parameter
Unique identifier of the device
Cloud initiated communication
TLS / SSL
IPS (Instrusion Prevention System)
Firewalll
Transparent, slide
Translucent, transparency
Opaque, flip chart
Opaque, transparency
Security
Signaling
Power Consumption
Presence Detection
A router
A Firewall
A Network Protocol
Python Shell
Phishing
Surfing
DDoS
Revealing
Trojan horse
Wamp
Match the following Internet security threats with their definitions.
A-1, B-2, C-3, D-4
A-4, B-3, C-1, D-2
A-3, B-4, C-2, D-1
A-2, B-1, C-4, D-3
Subject
Body
Address
Salutation
time slice
RMS
cooperative multitasking
pre-emptive
TCP
HTTP
IP
FTP
physical computing
chemical computing
mechanism
cloud computing
e-Government related
Enterprise
company based
Business oriented plateform
Auditing
Authorisation
Process
People
Things
Service provider
SaaS
IaaS
Smartphones
Tablet and PCs
Smart Watches
All of the above
Match the cryptographic attacks with their definitions.
1 → D, 2 → B, 3 → C, 4 →A
1 → C, 2 → A, 3 → B, 4 → D
1 → B, 2 → D, 3 → A, 4 → C
1 → A, 2 → D, 3 → B, 4 → C
avrgcc
g++
cpython
avrdude
XMPP
SPI
MQTT
HTTPS
Encryption
Decryption
Locking
Registering
Standard
Regulation
Internet
NANO
OCTAVE
PASTA
Biometric Data
Passwords
Private data
backup
Coulomb's Law
Lenz's Law
Fleming's Right-hand Rule
Fleming's Left-hand Rule
Setting a selected bit of R
Clearing a selected bit of R
Complement selected bit of R
Experiment
Inquiry
Investigation
Motes
Monitoring devices
Edge monitors
DSL
W3C
MIT
Firewall
Sensors
Actuators
Smart Applications
All of the Above
Power Detection
Power Consunmption
Systems
Devices
Networks
Services
CPU, ROM, I/O ports and timers
RAM, ROM, 1/0 ports and timers
PU, RAM, 1/O ports and timers
CPU, RAM, ROM, I/O ports and timers
Eavesdropping
SSL
SMTP
SFTP