100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Ceh.v10 IoT Hacking Exam Questions with Answers £10.87   Add to cart

Exam (elaborations)

Ceh.v10 IoT Hacking Exam Questions with Answers

 3 views  0 purchase
  • Module
  • Ceh.v10 IoT Hacking
  • Institution
  • Ceh.v10 IoT Hacking

Ceh.v10 IoT Hacking Exam Questions with Answers Attack Area : Device memory - Answer-Vulnerability present it this competent are clear-text credentials, third-party credentials and encryption keys Attack Area : Ecosystem access control - Answer-Vulnerability present it this competent are Impl...

[Show more]

Preview 3 out of 16  pages

  • August 12, 2024
  • 16
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Ceh.v10 IoT Hacking
  • Ceh.v10 IoT Hacking
avatar-seller
Ceh.v10 IoT Hacking Exam Questions
with Answers

Attack Area : Device memory - Answer-Vulnerability present it this competent are clear-
text credentials, third-party credentials and encryption keys

Attack Area : Ecosystem access control - Answer-Vulnerability present it this competent
are Implicit Trust between Components, Enrollment Security, Decommissioning System
and Lost Access Procedures

Attack Area : Device Firmware - Answer-Vulnerability present it this competent are
Hardcoded Credentials, Sensitive Information/URL Disclosure , Encryption Keys and
Firmware Version Display and/or Last Update Date

Attack Area : Device web interface - Answer-Vulnerability present it this competent are
SQL Injection, Cross-site Scripting, Cross-site Request Forge, Username Enumeration,
Weak Password, Account Lockout and Known Default Credentials

Attack Area : Device physical interfaces - Answer-Vulnerability present it this competent
are Firmware Extraction, User CLI (command-line interface), Admin CLI, Privilege
Escalation, Reset to Insecure State and Removal of Storage Media

Attack Area : Device Network Service - Answer-Vulnerability present it this competent
are Information Disclosure Firmware, Denial-of-Service, UPnP, Vulnerable UDP
Services, User and admin CLI, Injection and Unencrypted services and Poorly
implemented encryption

Attack Area : Administrative Interface - Answer-Vulnerability present it this competent
are SQL Injection, Cross-site Scripting and Cross-site Request Forgery, Username
Enumeration and Known Default Credentials , Weak Passwords and Account Lockout ,
Security/encryption and Logging options, Two-factor authentication and Inability to wipe
device

Attack Area : Local Data Storage - Answer-Vulnerability present it this competent are
Unencrypted Data , Data Encrypted with Discovered Keys and Lack of Data Integrity
Checks

Attack Area : Cloud Web Interface - Answer-Vulnerability present it this competent are
Transport Encryption, SQL Injection, Cross-site Scripting and Cross-site Request
Forgery, Username Enumeration and Known Default Credentials, Weak Passwords and

,Account Lockout , Insecure password recovery mechanism and Two-factor
authentication

Attack Area : Update Mechanism - Answer-Vulnerability present it this competent are
Update Sent without Encryption, Updates Not Signed, Update Verification, Malicious
Update, Missing Update Mechanism and No Manual Update Mechanism

Attack Area : Vendor Backend API's - Answer-Vulnerability present it this competent are
Inherent Trust of Cloud or Mobile Application, Weak Authentication and Weak Access
Controls.

Attack Areas of Mobile Application - Answer-Vulnerability present it this competent are
Implicitly Trusted by Device or Cloud, Username Enumeration, Account Lockout, Known
Default Credentials or Weak Passwords, Insecure Data Storage

Attack Area : Third-party Backend APIs - Answer-Vulnerability present it this competent
are Unencrypted PII Sent, Device Information Leaked and Location Leaked
Internet of Things (IoT) - Answer-Refers to the network of devices with an IP address
that have the capability of sensing, collecting and sending data using embedded
sensors, communication hardware and processors

Application + Network + Mobile + Cloud = ?

Components of IoT - Answer-o Sensing technology
o IoT Gateways
o Cloud Server/ Data Storage
o Remote Control using Mobile App

Components of IoT : Sensing Technology - Answer-Sensors embedded in the devices
sense a wide variety of information from their surroundings like temperature, gases,
location, working of some industrial machine as well as sensing health data of a patient.

Components of IoT : IoT Gateways - Answer-These are used to bridge the gap between
the IoT device (internal network) and the end user (external network) and thus allowing
them to connect and communicate with each other. The data collected by the sensors in
IoT devices send the collected data to the concerned user or cloud through this

Components of IoT : Remote Control using Mobile App - Answer-The end user uses
remote controls such as mobile phones, tabs, laptops, etc. installed with a mobile app to
monitor, control, retrieve data, and take a specific action on IoT devices from a remote
location.

Components of IoT : Cloud Server/Data Storage: - Answer-The collected data after
travelling through the gateway arrives at the cloud, where it is stored and undergoes
data analysis. The processed data is then transmitted to the user where he/she takes
certain action based on the information received by him/her.

, IoT Architecture - Answer-o Application Layer
o Middleware Layer
o Internet Layer
o Access Gateway Layer
o Edge Technology Layer

IoT Architecture : Edge Technology Layer - Answer-This layer consists of all the
hardware parts like sensors, RFID tags, readers or other soft sensors and the device
itself.

These entities are the primary part of the data sensors that are deployed in the field for
monitoring or sensing various phenomena. This layer plays an important part in data
collection, connecting devices within the network and with the server.

IoT Architecture : Access Gateway Layer - Answer-This layer helps to bridge the gap
between two end points like a device and a client. The very first data handling also
takes place in this layer. It carries out message routing, message identification and
subscribing.

IoT Architecture : Internet Layer - Answer-This is the crucial layer as it serves as the
main component in carrying out the communication between two end points such as
device-to-device, device-to-cloud, device-to-gateway and back-end data-sharing

IoT Architecture : Middleware Layer - Answer-This is one of the most critical layers that
operates in two-way mode. As the name suggests this layer sits in the middle of the
application layer and the hardware layer, thus behaving as an interface between these
two layers.

It is responsible for important functions such as data management, device management
and various issues like data analysis, data aggregation, data filtering, device information
discovery and access control.

IoT Architecture : Application Layer - Answer-This layer placed at the top of the stack, is
responsible for the delivery of services to the respective users from different sectors
like building, industrial, manufacturing, automobile, security, healthcare, etc.

Short-range Wireless Communication - Answer-o Bluetooth low energy
o Light-fidelity LiFi
o Near Field Communication
o QR Codes and Barcodes
o Radio Frequency Identification
o Thread
o Wifi
o Wifi Direct
o z-wave

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £10.87. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79202 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling
£10.87
  • (0)
  Add to cart