ExamLookup
Menu mobile
Home
Current Affairs
General Knowledge
Computer
Python
HTML
MCQ IOT - SECURITY AND FUTURE OF IOT ECOSYSTEM MCQ Questions
English
Hindi
Question No. -
11
Report Bug
Which statement(s) are true about a brute force attack
Which statement(s) are true about a brute force attack
A.
Crack a password or username
Crack a password or username
B.
Find a hidden web page
Find a hidden web page
C.
find the key used to encrypt a message
find the key used to encrypt a message
D.
All of the above
All of the above
Question No. -
12
Report Bug
Dictionary attacks is a kind of
Dictionary attacks is a kind of
A.
Injection Attack
Injection Attack
B.
Brute force attack
Brute force attack
C.
Session Hijacking
Session Hijacking
D.
None of these
None of these
Question No. -
13
Report Bug
Bonet is often used to launch _____ attack
Bonet is often used to launch _____ attack
A.
DoS
DoS
B.
DDoS
DDoS
C.
Brute Force
Brute Force
D.
Passive
Passive
Question No. -
14
Report Bug
To secure your data on IoT devices
IoT उपकरणों पर अपना डेटा सुरक्षित करने के लिए
IoT उपकरणों पर अपना डेटा सुरक्षित करने के लिए
A.
Keep changing your password
Keep changing your password
B.
Update your every device
Update your every device
C.
Avoid using devices that are risky
Avoid using devices that are risky
D.
All of the above
All of the above
Question No. -
15
Report Bug
Bitcoin is the first distributed blockchain implementation
Bitcoin is the first distributed blockchain implementation
Bitcoin is the first distributed blockchain implementation
A.
TRUE
सही
B.
FALSE
गलत
Question No. -
16
Report Bug
You cannot access your data from any computer in the world, as long as you have an internet connection
You cannot access your data from any computer in the world, as long as you have an internet connection
A.
TRUE
सही
B.
FALSE
गलत
Question No. -
17
Report Bug
Trojan Horse are very similar to virus in that they are computer programs that replicate copies of themselves
Trojan Horse are very similar to virus in that they are computer programs that replicate copies of themselves
Trojan Horse are very similar to virus in that they are computer programs that replicate copies of themselves
A.
TRUE
सही
B.
FALSE
गलत
Question No. -
18
Report Bug
In blockchain, each block is linked backward to the previous block
In blockchain, each block is linked backward to the previous block
In blockchain, each block is linked backward to the previous block
A.
TRUE
सही
B.
FALSE
गलत
Question No. -
19
Report Bug
Default or hardcoded password can be misused by hackers
Default or hardcoded password can be misused by hackers
A.
TRUE
सही
B.
FALSE
गलत
Question No. -
20
Report Bug
Password is the method of Authentication, Confidentiality, Integrity and availability are basic requirements of Internet security
Password is the method of Authentication, Confidentiality, Integrity and availability are basic requirements of Internet security
Password is the method of Authentication, Confidentiality, Integrity and availability are basic requirements of Internet security
A.
TRUE
सही
B.
FALSE
गलत
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
CCC Online Test 2021
CCC Practice Test Hindi
Python Programming Tutorials
Best Computer Training Institute in Prayagraj (Allahabad)
O Level NIELIT Study material and Quiz
Bank SSC Railway TET UPTET Question Bank
career counselling in allahabad
Sarkari Exam Quiz
Website development Company in Allahabad