Skip to Content

Common Technical Interview Questions and Answers Update on August 18, 2021

Exam Question 41

Which IoT security threat is defined as an attack where multiple compromised OSes target a server, website or network to overwhelm a network with traffic, causing it to slow down or crash and deny service to legitimate users or systems?

A. Ransomware
B. Distributed denial of service (DDoS)
C. Malware
D. Man in the middle
Correct Answer:
B. Distributed denial of service (DDoS)
Answer Description:
IT admins must prepare for more security challenges than these four, but DDoS attacks can cause major downtime to essential services. Many IoT botnets, such as the well-known Mirai botnet, use DDoS attacks to overload a network with traffic. IT admins can prevent a DDoS attack from spreading through the use of intrusion prevention and detection systems and other basic security practices, such as changing default passwords.

Exam Question 42

Trusted Platform Modules make certificate-based security or digital signing processes more secure; however, the disadvantage organizations must consider is:

A. They control the host system they are embedded on.
B. They don’t offer secure booting of IoT devices.
C. They make device maintenance more difficult.
D. They can’t be used with firewalls.
Correct Answer:
B. They don’t offer secure booting of IoT devices.
Answer Description:
Organizations use TPMs — specialized chips embedded in devices � to store artifacts, such as passwords, certificates or encryption keys, for hardware authentication. TPMs don’t protect the IoT device if an attacker gets access to an early boot code. TPMs do make device maintenance easier because they verify installed updates and that the device functions properly, and they must be used with other security measures, such as firewalls. They also don’t control anything on the device they are embedded on.

Exam Question 43

Which of the following is not a best practice to ensure IoT devices are physically secure?

A. Deploy only authenticated devices.
B. Put it in a tamper-resistant case.
C. Camouflage the device.
D. Disable the device when tampered with.
Correct Answer:
C. Camouflage the device.
Answer Description:
When it comes to IoT device security, major cyberthreats, such as an IoT botnet, likely come first to the IT professional’s mind. But IT admins must also consider devices’ physical security. Hackers can open up an IoT device to access inner components as an entry point to the rest of a network. Physical security measures can include simple measures, such as removing any stickers with default passwords on the device or placing the device in a tamper-resistant case.