ЁЯЪА Hurry! Offer Ends In
00 Days
00 Hours
00 Mins
00 Secs
Enroll Now
X

MCQs on IOT Security

Ques 1

UPPCL AA 2023

рдХреНрд░рд┐рдкреНрдЯреЛрдЧреНрд░рд╛рдлреА рдореЗрдВ рдирд┐рдЬреА рдХреБрдВрдЬреА рдХреЗ рдмрд╛рд░реЗ рдореЗрдВ рдирд┐рдореНрдирд▓рд┐рдЦрд┐рдд рдореЗрдВ рд╕реЗ рдХреМрди рд╕рд╛ рдХрдерди рдЧрд▓рдд рд╣реИ?

Which of the following statements are FALSE about private keys in cryptography?

i) It is a key to be given to the public.
ii) It is a key that opens a secret door.
iii) This key is also known as a secret key.
iv) This key should only be shared with its generator or the parties authorised to decrypt the data.

[A] Only i, ii and iii

[B] All of i ii, iii and iv

[C] Only iii and iv

[D] Only i and ii

Correct Answer : Only i, ii and iii


Ques 2

MPESB Police Constable 2023

__рдХрд┐рд╕реА рдПрдкреНрд▓рд┐рдХреЗрд╢рди рдХреЗ рдмрд╛рд░реЗ рдореЗрдВ рдПрдХ рдХрд╛рдиреВрдиреА рд╕рдордЭреМрддрд╛ рд╣реИред рдпрд╣ рд╕реЙрдлрд╝реНрдЯрд╡реЗрдпрд░ рдирд┐рд░реНрдорд╛рддрд╛ рдФрд░ рдЕрдВрддрд┐рдо рдЙрдкрдпреЛрдЧрдХрд░реНрддрд╛ рдХреЗ рдмреАрдЪ рд╣реЛрддрд╛ рд╣реИ рдФрд░ рдЙрдирдХреЗ рдмреАрдЪ рдХрд╛рдиреВрдиреА рд░реВрдк рд╕реЗ рдмрд╛рдзреНрдпрдХрд╛рд░реА рдЕрдиреБрдмрдВрдз рдХрд╛ рдПрдХ рдорд╣рддреНрд╡рдкреВрд░реНрдг рд╣рд┐рд╕реНрд╕рд╛ рд╣реИ, рдпрд╛рдиреА рд╕реЙрдлрд╝реНрдЯрд╡реЗрдпрд░ рдирд┐рд░реНрдорд╛рддрд╛ рдФрд░ рдЕрдВрддрд┐рдо рдЙрдкрдпреЛрдЧрдХрд░реНрддрд╛ рдХреЗ рдмреАрдЪред

___is a legal agreement about an application. It is between the software producer and the end-user and is an important part of the legally binding contract between them i.e. between the software producer and the end-user.

[A] Antivirus

[B] Software Licensing

[C] Cookies

[D] Malware

Correct Answer : Software Licensing


Ques 3

MPESB Police Constable 2023

рдирд┐рдореНрдирд▓рд┐рдЦрд┐рдд рдореЗрдВ рд╕реЗ рдХреМрди рд╕рд╛ рдХрдВрдкреНрдпреВрдЯрд░ рд╡рд╛рдпрд░рд╕ рд╣реИ? I. рд╕реНрдкрд╛рдЗрд╡реЗрдпрд░ II. рдХреАрд▓реЙрдЧрд░реНрд╕ III. рд░реИрдирд╕рдорд╡реЗрдпрд░ IV. рдЯреНрд░реЛрдЬрди рд╣реЙрд░реНрд╕

Which of the following is/are the computer viruses? I. spyware II. keyloggers III. Ransomware IV. trojan horses

[A] only IV

[B] II and IV

[C] I, II and IV

[D] All I, II, III and IV

Correct Answer : All I, II, III and IV


Ques 4

UPPCL-TG2-2021

рдирд┐рдореНрдирд▓рд┐рдЦрд┐рдд рдореЗрдВ рд╕реЗ рдХреМрди рд╕рд╛ рд╕реНрдорд╛рд░реНрдЯрдлреЛрди рдХреА рд╕реБрд░рдХреНрд╖рд╛ рдмрдврд╝рд╛рдиреЗ рдХреЗ рд▓рд┐рдП рд╕реБрдЭрд╛рд╡ рдирд╣реАрдВ рд╣реИ?

Which of the following is NOT a tip to boost the security of smartphones?

[A] Use pin or password to lock your phone.

[B] Backup your data.

[C] Turn off Wi-Fi or Bluetooth when not in use.

[D] Share your personal information online

Correct Answer : Share your personal information online


Ques 5

DSSSB TGT -2023

рдиреАрдЪреЗ рджреА рдЧрдИ рдЪреБрдиреМрддрд┐рдпреЛрдВ рдореЗрдВ рд╕реЗ, IoT рдЕрдкрдирд╛рдиреЗ рдореЗрдВ рдХреМрди рд╕реА рдЪреБрдиреМрддрд┐рдпрд╛рдБ рд╢рд╛рдорд┐рд▓ рд╣реИрдВ?

From the challenges given below, which of the challenge doe s IoT adoption include ?

[A] Deepfake

[B] Black box

[C] Security

[D] Cloud storage

Correct Answer : Security


Ques 6

uppcl tg2-2023

рдирд┐рдореНрдирд▓рд┐рдЦрд┐рдд рдореЗрдВ рд╕реЗ рд╕рднреА рд╡рд╛рд╕реНрддрд╡рд┐рдХ рд╕реБрд░рдХреНрд╖рд╛ рдФрд░ рдЧреЛрдкрдиреАрдпрддрд╛ рдЬреЛрдЦрд┐рдореЛрдВ рдХреЗ рдЙрджрд╛рд╣рд░рдг рд╣реИрдВ, рд╕рд┐рд╡рд╛рдпред

All of the following are example of real security and privacy risks , except for .

[A] Hackers

[B] Spam

[C] Viruses

[D] Identity Theft

Correct Answer : Spam


Ques 7

UPPCL TGT -2023

рдирд┐рдореНрдирд▓рд┐рдЦрд┐рдд рдореЗрдВ рд╕реЗ рдХреМрди-рд╕рд╛ рдПрдХ IoT рд╕рд┐рдХреНрдпреЛрд░рд┐рдЯреА рдереНрд░реЗрдЯ рдХрд╛ рдкреНрд░рдХрд╛рд░ рдирд╣реАрдВ рд╣реИ?

Which of the following is not a type of IoT security threat?

[A] Main-in-the-middle

[B] Social Networking

[C] Social Engineering

[D] Ransomware

Correct Answer : Social Networking


Ques 8

UPPCL TGT -2023

IoT рдореЗрдВ DDoS рд╕рд┐рдХреНрдпреЛрд░рд┐рдЯреА рдЕрдЯреИрдХ рдХрд╛ рд░реВрдк рдХреНрдпрд╛ рд╣реИ?

What is the form of DDoS security attack in IoT?

[A] Distributed distribution of software

[B] Distributed Denial of Service

[C] Direct Distraction of Service

[D] Direct Detention of Software

Correct Answer : Distributed Denial of Service


Ques 9

UPPCL TGT -2023

рдирд┐рдореНрдирд▓рд┐рдЦрд┐рдд рдореЗрдВ рд╕реЗ рдХреМрди рд╕рд╛ IoT рд╕реБрд░рдХреНрд╖рд╛ рдЦрддрд░реЗ рдХрд╛ рдПрдХ рдкреНрд░рдХрд╛рд░ рдирд╣реАрдВ рд╣реИ?

Which of the following is not a type of an IoT security threat ?

[A] Social engineering

[B] Social networking

[C] Man in the middle

[D] Ransomware

Correct Answer : Social networking


Latest Updates