Questions

Having read this chapter, try answering the following questions on your own:

  1. True/False. The code used in the Mirai botnet attack in 2016 was released to the public in order to create plausible deniability for the creators.
  2. True/False. A command and control server is used in DDoS attacks.
  3. What is a cross-site scripting attack?
  4. Name three of the possible types of attacks against our edge analytics applications.
  5. True/False. A sniffer is a type of spying tool that is set up between our internet router and edge computer.
  6. How does a cyber criminal trick you into giving them your username and password when you log on to a legitimate website?
  7. True/False. A physical key switch can be used as a form of security protection on our edge device.
  8. What are some of the libraries that we can use to write a machine learning module?
  9. True/False. The name of the Microsoft tool used to monitor security threats is called Azure Security Center for IoT.
  10. True/False. Ensuring that device configuration files are up to date is good practice when taking an audit of the devices used on our applications.