MCQs on IOT Security
UPPCL AA 2023
рдХреНрд░рд┐рдкреНрдЯреЛрдЧреНрд░рд╛рдлреА рдореЗрдВ рдирд┐рдЬреА рдХреБрдВрдЬреА рдХреЗ рдмрд╛рд░реЗ рдореЗрдВ рдирд┐рдореНрдирд▓рд┐рдЦрд┐рдд рдореЗрдВ рд╕реЗ рдХреМрди рд╕рд╛ рдХрдерди рдЧрд▓рдд рд╣реИ?
Which of the following statements are FALSE about private keys in cryptography?
i) It is a key to be given to the public.
ii) It is a key that opens a secret door.
iii) This key is also known as a secret key.
iv) This key should only be shared with its generator or the parties authorised to decrypt the data.
[A] Only i, ii and iii
[B] All of i ii, iii and iv
[C] Only iii and iv
[D] Only i and ii
Correct Answer : Only i, ii and iii
MPESB Police Constable 2023
__рдХрд┐рд╕реА рдПрдкреНрд▓рд┐рдХреЗрд╢рди рдХреЗ рдмрд╛рд░реЗ рдореЗрдВ рдПрдХ рдХрд╛рдиреВрдиреА рд╕рдордЭреМрддрд╛ рд╣реИред рдпрд╣ рд╕реЙрдлрд╝реНрдЯрд╡реЗрдпрд░ рдирд┐рд░реНрдорд╛рддрд╛ рдФрд░ рдЕрдВрддрд┐рдо рдЙрдкрдпреЛрдЧрдХрд░реНрддрд╛ рдХреЗ рдмреАрдЪ рд╣реЛрддрд╛ рд╣реИ рдФрд░ рдЙрдирдХреЗ рдмреАрдЪ рдХрд╛рдиреВрдиреА рд░реВрдк рд╕реЗ рдмрд╛рдзреНрдпрдХрд╛рд░реА рдЕрдиреБрдмрдВрдз рдХрд╛ рдПрдХ рдорд╣рддреНрд╡рдкреВрд░реНрдг рд╣рд┐рд╕реНрд╕рд╛ рд╣реИ, рдпрд╛рдиреА рд╕реЙрдлрд╝реНрдЯрд╡реЗрдпрд░ рдирд┐рд░реНрдорд╛рддрд╛ рдФрд░ рдЕрдВрддрд┐рдо рдЙрдкрдпреЛрдЧрдХрд░реНрддрд╛ рдХреЗ рдмреАрдЪред
___is a legal agreement about an application. It is between the software producer and the end-user and is an important part of the legally binding contract between them i.e. between the software producer and the end-user.
[A] Antivirus
[B] Software Licensing
[C] Cookies
[D] Malware
Correct Answer : Software Licensing
MPESB Police Constable 2023
рдирд┐рдореНрдирд▓рд┐рдЦрд┐рдд рдореЗрдВ рд╕реЗ рдХреМрди рд╕рд╛ рдХрдВрдкреНрдпреВрдЯрд░ рд╡рд╛рдпрд░рд╕ рд╣реИ? I. рд╕реНрдкрд╛рдЗрд╡реЗрдпрд░ II. рдХреАрд▓реЙрдЧрд░реНрд╕ III. рд░реИрдирд╕рдорд╡реЗрдпрд░ IV. рдЯреНрд░реЛрдЬрди рд╣реЙрд░реНрд╕
Which of the following is/are the computer viruses? I. spyware II. keyloggers III. Ransomware IV. trojan horses
[A] only IV
[B] II and IV
[C] I, II and IV
[D] All I, II, III and IV
Correct Answer : All I, II, III and IV
UPPCL-TG2-2021
рдирд┐рдореНрдирд▓рд┐рдЦрд┐рдд рдореЗрдВ рд╕реЗ рдХреМрди рд╕рд╛ рд╕реНрдорд╛рд░реНрдЯрдлреЛрди рдХреА рд╕реБрд░рдХреНрд╖рд╛ рдмрдврд╝рд╛рдиреЗ рдХреЗ рд▓рд┐рдП рд╕реБрдЭрд╛рд╡ рдирд╣реАрдВ рд╣реИ?
Which of the following is NOT a tip to boost the security of smartphones?
[A] Use pin or password to lock your phone.
[B] Backup your data.
[C] Turn off Wi-Fi or Bluetooth when not in use.
[D] Share your personal information online
Correct Answer : Share your personal information online
DSSSB TGT -2023
рдиреАрдЪреЗ рджреА рдЧрдИ рдЪреБрдиреМрддрд┐рдпреЛрдВ рдореЗрдВ рд╕реЗ, IoT рдЕрдкрдирд╛рдиреЗ рдореЗрдВ рдХреМрди рд╕реА рдЪреБрдиреМрддрд┐рдпрд╛рдБ рд╢рд╛рдорд┐рд▓ рд╣реИрдВ?
From the challenges given below, which of the challenge doe s IoT adoption include ?
[A] Deepfake
[B] Black box
[C] Security
[D] Cloud storage
Correct Answer : Security
uppcl tg2-2023
рдирд┐рдореНрдирд▓рд┐рдЦрд┐рдд рдореЗрдВ рд╕реЗ рд╕рднреА рд╡рд╛рд╕реНрддрд╡рд┐рдХ рд╕реБрд░рдХреНрд╖рд╛ рдФрд░ рдЧреЛрдкрдиреАрдпрддрд╛ рдЬреЛрдЦрд┐рдореЛрдВ рдХреЗ рдЙрджрд╛рд╣рд░рдг рд╣реИрдВ, рд╕рд┐рд╡рд╛рдпред
All of the following are example of real security and privacy risks , except for .
[A] Hackers
[B] Spam
[C] Viruses
[D] Identity Theft
Correct Answer : Spam
UPPCL TGT -2023
рдирд┐рдореНрдирд▓рд┐рдЦрд┐рдд рдореЗрдВ рд╕реЗ рдХреМрди-рд╕рд╛ рдПрдХ IoT рд╕рд┐рдХреНрдпреЛрд░рд┐рдЯреА рдереНрд░реЗрдЯ рдХрд╛ рдкреНрд░рдХрд╛рд░ рдирд╣реАрдВ рд╣реИ?
Which of the following is not a type of IoT security threat?
[A] Main-in-the-middle
[B] Social Networking
[C] Social Engineering
[D] Ransomware
Correct Answer : Social Networking
UPPCL TGT -2023
IoT рдореЗрдВ DDoS рд╕рд┐рдХреНрдпреЛрд░рд┐рдЯреА рдЕрдЯреИрдХ рдХрд╛ рд░реВрдк рдХреНрдпрд╛ рд╣реИ?
What is the form of DDoS security attack in IoT?
[A] Distributed distribution of software
[B] Distributed Denial of Service
[C] Direct Distraction of Service
[D] Direct Detention of Software
Correct Answer : Distributed Denial of Service
UPPCL TGT -2023
рдирд┐рдореНрдирд▓рд┐рдЦрд┐рдд рдореЗрдВ рд╕реЗ рдХреМрди рд╕рд╛ IoT рд╕реБрд░рдХреНрд╖рд╛ рдЦрддрд░реЗ рдХрд╛ рдПрдХ рдкреНрд░рдХрд╛рд░ рдирд╣реАрдВ рд╣реИ?
Which of the following is not a type of an IoT security threat ?
[A] Social engineering
[B] Social networking
[C] Man in the middle
[D] Ransomware
Correct Answer : Social networking