Asset
Vulnerability
Threat
Time
Auditing
Authorisation
Authentication
Accounting
32
64
8
16
e-Government related
Enterprise
company based
Business oriented plateform
Things
Motes
Monitoring devices
Edge monitors
Simplex
Duplex
Full-Duplex
None of these
Sensors
Actuators
Smart Applications
All of the Above
time slice
RMS
cooperative multitasking
pre-emptive
Match the following Internet security threats with their definitions.
A-1, B-2, C-3, D-4
A-4, B-3, C-1, D-2
A-3, B-4, C-2, D-1
A-2, B-1, C-4, D-3
Match the cryptographic attacks with their definitions.
1 → D, 2 → B, 3 → C, 4 →A
1 → C, 2 → A, 3 → B, 4 → D
1 → B, 2 → D, 3 → A, 4 → C
1 → A, 2 → D, 3 → B, 4 → C
Mirai botnet
cipher
Ethernet
Stuxnet
Phishing
Surfing
Trojan horse
Eavesdropping
Service provider
SaaS
IaaS
None
Systems
Devices
Networks
Services
Encryption
Decryption
Locking
Registering
Improve usability and interoperability
Reduce the security
Complicate the development
Increase the cost
Cloud initiated communication
TLS / SSL
IPS (Instrusion Prevention System)
Firewalll
Protocol abstraction
Simple and fast installation
Security with hardware
Data storage
DREAD
OWASP
STRIDE
DAR
Confidentiality
Integrity
Both of these
Availability
Setting a selected bit of R
Clearing a selected bit of R
Complement selected bit of R
Signaling
Security
Power Detection
Power Consunmption
name of spouse
Name of hobby
Contains multiple random digit with special charactor
None of the above
Eclipse Kura
Red Hat
Intercloud
Bot 2 Bot
Experiment
Inquiry
Investigation
All of these
physical computing
chemical computing
mechanism
cloud computing
XMPP
SPI
MQTT
HTTPS
Request-response model
Push-pull model
Publish-subscribe model
Authoring
Authorization
DoS
DDoS
Brute force
Passive
Subject
Body
Address
Salutation
Eelipse Kapua
Revealing
TCP
HTTP
IP
FTP
Wamp
Darkmotel
Mirai
Petye
whitehorse
Smartphones
Tablet and PCs
Smart Watches
All of the above
Signal
Machine to machine
Interconnected
Network
Principle of least privilege
Defence in depth
Attack surface
Virus
Natural Disaster
Spoofing
NANO
OCTAVE
PASTA
Biometric Data
Passwords
Private data
backup
Power Consumption
Presence Detection
CPU, ROM, I/O ports and timers
RAM, ROM, 1/0 ports and timers
PU, RAM, 1/O ports and timers
CPU, RAM, ROM, I/O ports and timers
DSL
W3C
MIT
Firewall
Standard
Regulation
Internet
Transparent, slide
Translucent, transparency
Opaque, flip chart
Opaque, transparency
Spam
Injection
DoS attack
avrgcc
g++
cpython
avrdude