IT Questions Bank Mar 16, 2020 Last Updated: Jun 29, 2023 No Comments Share Tweet Share Pin it IT Questions Bank › Category: IoT SecurityWhich IoT wireless option is commonly used by devices that require a low power wide-area network connection and do not use a fixed power supply?ITExamAnswers asked 2 years ago • IoT SecurityWhich basic security service protects against alteration of data while it is in transit?ITExamAnswers asked 2 years ago • IoT SecurityWhich type of IoT wireless deployment would allow smart objects to be deployed over a very large area?ITExamAnswers asked 2 years ago • IoT SecurityWhich customized IEEE 802.15.4 wireless topology can contain a large amount of full function devices and a small amount of reduced function devices?ITExamAnswers asked 2 years ago • IoT SecurityWhich two OWASP communication layer vulnerabilities should be researched when securing the IoT device network services attack surface? (Choose two.)ITExamAnswers asked 2 years ago • IoT SecurityWhich attack involves threat actors positioning themselves between a source and destination with the intent of transparently monitoring, capturing, and controlling the communication?ITExamAnswers asked 4 years ago • CCNA CyberOps, CCNA Security, IoT SecurityIn which type of scenario would an IoT gateway not be required to convert traffic to Wi-Fi or wired ethernet?ITExamAnswers asked 2 years ago • IoT SecurityWhich type of IoT wireless network would interconnect audio devices and smart watches to a cell phone that serves as an IoT gateway?ITExamAnswers asked 2 years ago • IoT SecurityA threat actor uses non-blind spoofing to launch an attack. What are two objectives for the attack? (Choose two.)ITExamAnswers asked 2 years ago • IoT SecurityWhich OWASP communication layer vulnerability should be researched when securing the IoT network traffic attack surface?ITExamAnswers asked 2 years ago • IoT SecurityA home owner recently installed an IoT smart plug that was designed to be controlled over the internet. After a couple of days the home owner notices a new wireless name of Outlet4375 appears when they attempt to connect a smartphone to the house wireless network. Which statement identifies the situation that is occurring?ITExamAnswers asked 2 years ago • IoT SecurityWhy would an engineer only use very short-range radios to allow sensor data to travel from node to node until the data reaches the IoT gateway?ITExamAnswers asked 2 years ago • IoT SecurityA security engineer is researching the secure deployments of critical IoT devices. How does the principle of identity and access management (IAM) define security with these types of devices?ITExamAnswers asked 2 years ago • IoT SecurityWhich type of access control model uses access control lists to allow users to control access to their own data?ITExamAnswers asked 2 years ago • IoT SecurityWhat are three potential vulnerabilities related to a hardware sensor? (Choose three.)ITExamAnswers asked 2 years ago • IoT Security