IoT Security and Privacy # MCQs Practice set

Q.1 What is the primary security concern in IoT devices?

Battery life
Unauthorized access
Data compression
Network latency
Explanation - IoT devices often collect sensitive data, and unauthorized access can lead to data breaches and misuse.
Correct answer is: Unauthorized access

Q.2 Which encryption method is commonly used in IoT communications?

AES
JPEG
MP3
HTML
Explanation - AES (Advanced Encryption Standard) is widely used to secure IoT communications due to its balance of security and performance.
Correct answer is: AES

Q.3 Why are IoT devices more vulnerable than traditional computers?

They are larger in size
They have limited computing resources
They use stronger encryption
They do not connect to networks
Explanation - IoT devices usually have low processing power and memory, making it difficult to implement strong security measures.
Correct answer is: They have limited computing resources

Q.4 What is the main purpose of device authentication in IoT?

To track device location
To verify the identity of devices
To reduce power consumption
To improve graphics
Explanation - Authentication ensures that only legitimate devices are allowed to communicate within the IoT network.
Correct answer is: To verify the identity of devices

Q.5 Which of the following is a privacy risk in IoT?

Data encryption
User profiling
Battery optimization
Firmware update
Explanation - IoT devices often collect personal data, which can be used to create detailed user profiles, posing privacy risks.
Correct answer is: User profiling

Q.6 What does 'end-to-end encryption' mean in IoT?

Data is compressed before sending
Data is encrypted only at the device level
Data remains encrypted throughout transmission
Data is deleted after use
Explanation - End-to-end encryption ensures that data remains secure between the sender and the receiver without being exposed during transmission.
Correct answer is: Data remains encrypted throughout transmission

Q.7 Which protocol is most commonly used for IoT device communication?

SMTP
MQTT
FTP
POP3
Explanation - MQTT (Message Queuing Telemetry Transport) is a lightweight protocol widely used for IoT communication.
Correct answer is: MQTT

Q.8 What is a botnet attack in IoT?

A virus that damages hardware
A group of compromised IoT devices controlled remotely
An attack that reduces device battery life
A backup system for IoT devices
Explanation - In a botnet attack, multiple IoT devices are hijacked to launch large-scale cyberattacks like DDoS.
Correct answer is: A group of compromised IoT devices controlled remotely

Q.9 What is the role of a firewall in IoT security?

To speed up the network
To filter incoming and outgoing traffic
To store encrypted data
To reduce device size
Explanation - A firewall helps block unauthorized access by monitoring and controlling network traffic.
Correct answer is: To filter incoming and outgoing traffic

Q.10 Which of the following is an example of IoT security best practice?

Using default passwords
Disabling automatic updates
Regularly updating firmware
Sharing Wi-Fi credentials
Explanation - Firmware updates often contain critical security patches to protect against vulnerabilities.
Correct answer is: Regularly updating firmware

Q.11 Why is default password usage a risk in IoT devices?

It slows down the device
It is easily guessed by attackers
It drains the battery
It prevents firmware updates
Explanation - Default passwords are widely known, making devices vulnerable if not changed.
Correct answer is: It is easily guessed by attackers

Q.12 Which attack exploits unsecured IoT cameras and DVRs?

SQL Injection
Mirai Botnet
Phishing
Ransomware
Explanation - The Mirai botnet exploited vulnerable IoT devices like cameras and DVRs to launch DDoS attacks.
Correct answer is: Mirai Botnet

Q.13 What is the function of an intrusion detection system (IDS) in IoT?

Encrypts communication
Detects malicious activity
Improves Wi-Fi speed
Updates firmware automatically
Explanation - IDS monitors network traffic to detect suspicious activities or attacks.
Correct answer is: Detects malicious activity

Q.14 What is the primary challenge in securing IoT networks?

High processing power
Device diversity and scale
Strong encryption standards
Standardized protocols
Explanation - The large number and variety of IoT devices make uniform security implementation challenging.
Correct answer is: Device diversity and scale

Q.15 What does GDPR stand for in the context of IoT privacy?

General Data Protection Regulation
Global Device Privacy Rules
Government Data Policy Regulation
Generic Device Protection Rights
Explanation - GDPR is a European Union regulation for data privacy and protection, relevant to IoT systems handling personal data.
Correct answer is: General Data Protection Regulation

Q.16 Why is physical security important in IoT devices?

To improve Wi-Fi range
To prevent unauthorized physical access
To reduce power consumption
To enable remote control
Explanation - Attackers may tamper with IoT hardware if physical access is not secured.
Correct answer is: To prevent unauthorized physical access

Q.17 Which of the following is a secure IoT development practice?

Ignoring data encryption
Hardcoding passwords
Implementing secure boot
Allowing open ports
Explanation - Secure boot ensures that only trusted software is loaded during device startup.
Correct answer is: Implementing secure boot

Q.18 What is the risk of unencrypted IoT communication?

Faster battery drain
Easier eavesdropping
Better Wi-Fi range
Increased storage use
Explanation - Without encryption, attackers can intercept and read sensitive IoT communications.
Correct answer is: Easier eavesdropping

Q.19 What is the term for malicious software targeting IoT devices?

IoTware
Thingware
Malware
Hackware
Explanation - Like other systems, IoT devices are vulnerable to malware designed to disrupt or steal data.
Correct answer is: Malware

Q.20 What is the role of PKI (Public Key Infrastructure) in IoT security?

To store user passwords
To manage encryption keys and certificates
To reduce network latency
To compress IoT data
Explanation - PKI helps in securely managing digital certificates and encryption keys for IoT communication.
Correct answer is: To manage encryption keys and certificates

Q.21 What type of attack floods IoT devices with excessive traffic?

Phishing attack
DDoS attack
SQL Injection
Brute force
Explanation - Distributed Denial-of-Service (DDoS) attacks overwhelm IoT devices with massive traffic, causing downtime.
Correct answer is: DDoS attack

Q.22 Which of these is an IoT-specific security protocol?

CoAP
SMTP
SSH
Telnet
Explanation - Constrained Application Protocol (CoAP) is designed for IoT devices with limited resources.
Correct answer is: CoAP

Q.23 Which is a common IoT authentication method?

Username only
Biometric verification
File sharing
Screen resolution check
Explanation - Biometrics like fingerprint or face recognition are increasingly used for IoT device authentication.
Correct answer is: Biometric verification

Q.24 What is a digital certificate in IoT security?

A software license
A proof of device identity
A backup storage system
A hardware chip
Explanation - Digital certificates validate the authenticity of IoT devices in secure communications.
Correct answer is: A proof of device identity

Q.25 Which technique ensures that IoT firmware has not been tampered with?

Hashing
Data compression
IP masking
Signal boosting
Explanation - Hashing is used to verify firmware integrity by comparing computed hash values with originals.
Correct answer is: Hashing