Questions
As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:
- Which of the following is responsible for message routing and identification in an IoT architecture?
- The middleware layer
- The edge technology layer
- The access gateway layer
- The internet layer
- When is the Shodan search engine most likely to be employed in the IoT hacking methodology?
- Information gathering
- Vulnerability scanning
- Gaining access
- Launching attacks
- Which of the following countermeasures are effective in preventing IoT hacking? (Select all that apply.)
- Enabling lockout features for excessive login attempts
- Disabling guest and demo accounts
- Enabling UPnP
- Disabling telnet
- Of the tools listed, which is the best choice for quickly discovering the IP addresses of IoT devices on your network?
- MultiPing
- IoTInspector
- beSTORM
- Z-Wave Sniffer