1. Which of the following is the primary goal of a Man-in-the-Middle (MITM) attack?

A) Encrypting data for security
B) Intercepting and altering communication between two parties
C) Blocking communication channels permanently
D) Preventing DDoS attacks

Answer: B) Intercepting and altering communication between two parties
Explanation: A MITM attack allows an attacker to secretly intercept, modify, and relay communication between two parties without them knowing.


2. How do attackers typically perform a MITM attack on IoT devices?

A) By sending fake software updates
B) By using strong encryption algorithms
C) By exploiting weak authentication or insecure network protocols
D) By configuring IoT devices to avoid network communication

Answer: C) By exploiting weak authentication or insecure network protocols
Explanation: MITM attacks often take advantage of weak or missing authentication, unencrypted communication, and insecure network protocols to intercept traffic.


3. What is the primary purpose of SSL/TLS in securing IoT communication?

A) Encrypting data to prevent unauthorized access
B) Increasing internet speed
C) Disabling network traffic analysis
D) Allowing users to bypass firewalls

Answer: A) Encrypting data to prevent unauthorized access
Explanation: SSL/TLS encryption ensures that IoT device communication remains confidential and tamper-proof, preventing MITM attacks.


4. Which technique is effective in mitigating MITM attacks in IoT networks?

A) Using HTTP instead of HTTPS
B) Implementing mutual TLS authentication
C) Disabling encryption for better performance
D) Using open Wi-Fi networks for device communication

Answer: B) Implementing mutual TLS authentication
Explanation: Mutual TLS (mTLS) ensures both the client and server authenticate each other, significantly reducing the risk of MITM attacks.


5. What is the primary objective of a DDoS attack on IoT networks?

A) To improve device performance
B) To overwhelm devices and networks with excessive traffic
C) To strengthen network security
D) To enhance device communication speed

Answer: B) To overwhelm devices and networks with excessive traffic
Explanation: DDoS attacks flood IoT devices and networks with an excessive amount of traffic, disrupting normal operations and potentially causing device failures.


6. How do attackers commonly use IoT devices in DDoS attacks?

A) By directly controlling them via Bluetooth
B) By exploiting vulnerabilities and forming botnets
C) By installing antivirus software on them
D) By configuring them with strong security settings

Answer: B) By exploiting vulnerabilities and forming botnets
Explanation: Attackers compromise insecure IoT devices to form botnets like Mirai, which can be used to launch large-scale DDoS attacks.


7. What is a common strategy to prevent IoT devices from becoming part of a botnet?

A) Disabling automatic updates
B) Using default usernames and passwords
C) Regularly updating firmware and applying security patches
D) Connecting devices to open Wi-Fi networks

Answer: C) Regularly updating firmware and applying security patches
Explanation: Keeping firmware updated helps patch security vulnerabilities, preventing attackers from taking control of IoT devices for botnet formation.


8. How does rate limiting help in mitigating DDoS attacks?

A) It blocks all network traffic
B) It restricts excessive requests from a single source
C) It increases bandwidth for attackers
D) It allows attackers to access the system freely

Answer: B) It restricts excessive requests from a single source
Explanation: Rate limiting ensures that a single source cannot overload the system with too many requests, effectively mitigating DDoS attacks.


9. What security mechanism helps verify the authenticity of IoT device communications?

A) Digital signatures
B) Public Wi-Fi access
C) Open device pairing
D) Weak encryption protocols

Answer: A) Digital signatures
Explanation: Digital signatures help ensure that data from IoT devices has not been tampered with, verifying its authenticity and preventing MITM attacks.


10. What is the role of Intrusion Detection Systems (IDS) in IoT security?

A) Detecting and alerting on suspicious activities
B) Blocking all incoming network traffic
C) Disabling device authentication
D) Reducing network bandwidth

Answer: A) Detecting and alerting on suspicious activities
Explanation: IDS monitors network traffic for anomalies and potential threats, helping to identify MITM and DDoS attack attempts.


11. Which security feature helps prevent DNS Spoofing in IoT networks?

A) DNSSEC (DNS Security Extensions)
B) Open DNS resolution
C) Weak hashing algorithms
D) Disabling IP filtering

Answer: A) DNSSEC (DNS Security Extensions)
Explanation: DNSSEC protects against DNS spoofing by digitally signing DNS records, ensuring that IoT devices communicate with legitimate servers.


12. How can AI-powered anomaly detection enhance IoT security?

A) By automatically adjusting firewall rules
B) By detecting unusual network behavior and preventing attacks
C) By increasing device temperatures
D) By providing unlimited access to network traffic

Answer: B) By detecting unusual network behavior and preventing attacks
Explanation: AI-driven anomaly detection helps identify and stop MITM and DDoS attacks in real time by monitoring network behavior.


13. Which protocol provides end-to-end encryption for IoT data transmission?

A) MQTT with TLS
B) Telnet
C) HTTP without SSL
D) FTP

Answer: A) MQTT with TLS
Explanation: MQTT with TLS secures IoT data transmission, preventing eavesdropping and MITM attacks.


14. What is the most effective way to stop a botnet-driven DDoS attack?

A) Blocking IP addresses of compromised devices
B) Allowing unrestricted traffic
C) Using default credentials
D) Disabling encryption

Answer: A) Blocking IP addresses of compromised devices
Explanation: Blocking IP addresses of infected devices prevents botnet attacks from overwhelming the network.


15. How can IoT manufacturers improve device security against MITM attacks?

A) Implementing strong authentication mechanisms
B) Using weak passwords by default
C) Disabling encryption
D) Allowing unauthenticated remote access

Answer: A) Implementing strong authentication mechanisms
Explanation: Strong authentication (e.g., OAuth, mTLS) prevents unauthorized access, reducing MITM attack risks.


16. Which DDoS mitigation strategy involves filtering malicious traffic before it reaches the target?

A) Blackhole routing
B) Ignoring attacks
C) Increasing internet speed
D) Disabling firewall

Answer: A) Blackhole routing
Explanation: Blackhole routing drops malicious traffic before it impacts the target network, reducing DDoS attack effects.


17. Which cybersecurity principle helps minimize damage from IoT security breaches?

A) Least Privilege Access
B) Default open ports
C) Insecure APIs
D) Using unpatched software

Answer: A) Least Privilege Access
Explanation: Limiting device access to only necessary functions reduces MITM and DDoS attack risks.


18. Which of the following best describes a SYN flood attack, a common DDoS technique?

A) Exploiting IoT devices through firmware vulnerabilities
B) Sending an excessive number of SYN requests without completing the handshake
C) Encrypting network packets to avoid detection
D) Using IoT sensors to detect network congestion

Answer: B) Sending an excessive number of SYN requests without completing the handshake
Explanation: A SYN flood attack overwhelms a system by sending a large number of SYN (synchronize) requests without completing the TCP handshake, consuming resources and making the server unavailable.


19. What is ARP spoofing, and how does it facilitate MITM attacks?

A) It prevents MITM attacks by authenticating IP addresses
B) It manipulates MAC-to-IP address mappings to intercept traffic
C) It encrypts all communications to enhance security
D) It blocks DNS resolution to prevent device access

Answer: B) It manipulates MAC-to-IP address mappings to intercept traffic
Explanation: ARP spoofing allows attackers to trick devices into sending network traffic through the attacker’s machine, facilitating MITM attacks.


20. How does DNS tunneling enable cyber attacks on IoT networks?

A) By encrypting DNS queries to prevent security monitoring
B) By using DNS queries to covertly transmit malicious data
C) By blocking DNS resolution for certain domains
D) By preventing IoT devices from resolving domain names

Answer: B) By using DNS queries to covertly transmit malicious data
Explanation: DNS tunneling exploits DNS queries to transmit malware, command instructions, or data exfiltration under the disguise of normal DNS traffic.


21. What role does Multi-Factor Authentication (MFA) play in securing IoT devices against MITM attacks?

A) It allows attackers to bypass authentication easily
B) It strengthens authentication by requiring multiple verification steps
C) It makes IoT devices immune to malware
D) It replaces firewalls in network security

Answer: B) It strengthens authentication by requiring multiple verification steps
Explanation: MFA reduces MITM attack risks by requiring additional verification methods (e.g., OTP, biometrics) beyond just passwords.


22. How can IoT developers minimize risks of credential stuffing attacks leading to MITM threats?

A) By storing plaintext passwords in the database
B) By enforcing strong password policies and implementing rate-limiting
C) By using the same default credentials for all devices
D) By disabling user authentication

Answer: B) By enforcing strong password policies and implementing rate-limiting
Explanation: Credential stuffing attacks exploit weak passwords and reused credentials; enforcing strong passwords and rate-limiting helps mitigate them.


23. Which method can help detect and mitigate IoT-based DDoS attacks before they cause major damage?

A) Deep Packet Inspection (DPI)
B) Keeping IoT devices offline permanently
C) Avoiding firewalls
D) Using insecure network protocols

Answer: A) Deep Packet Inspection (DPI)
Explanation: DPI analyzes network traffic patterns, identifying malicious activities like IoT-based botnet traffic before they cause disruption.


24. What security principle ensures IoT devices only access necessary resources, reducing attack surfaces?

A) Zero Trust Architecture
B) Default open access
C) Unlimited administrative privileges
D) Weak encryption

Answer: A) Zero Trust Architecture
Explanation: Zero Trust requires verification at all levels, ensuring IoT devices only access necessary resources and reducing MITM & DDoS risks.


25. What makes IoT devices particularly vulnerable to DDoS attacks?

A) Their reliance on secure encryption
B) Limited computational resources and weak security configurations
C) Their ability to detect threats automatically
D) Strict implementation of security patches

Answer: B) Limited computational resources and weak security configurations
Explanation: IoT devices often have low processing power and weak security, making them easier to compromise for DDoS botnets.


26. What is the main advantage of using network segmentation for IoT security?

A) It isolates critical devices, limiting the spread of attacks
B) It increases network congestion
C) It removes the need for firewalls
D) It makes it easier to launch MITM attacks

Answer: A) It isolates critical devices, limiting the spread of attacks
Explanation: Network segmentation ensures that compromised IoT devices don’t infect critical systems, reducing MITM and DDoS risks.


27. What is the function of a Web Application Firewall (WAF) in mitigating IoT-based cyber threats?

A) Blocking malicious traffic targeting IoT devices
B) Encrypting all IoT communications
C) Preventing physical tampering of IoT hardware
D) Disabling authentication for easier access

Answer: A) Blocking malicious traffic targeting IoT devices
Explanation: A WAF filters and blocks malicious traffic, preventing attacks like MITM and DDoS targeting IoT-connected applications.


28. How does rate-based filtering help defend against DDoS attacks on IoT networks?

A) By restricting excessive requests from a single source
B) By disabling encryption
C) By allowing all traffic to pass through
D) By shutting down the entire network during an attack

Answer: A) By restricting excessive requests from a single source
Explanation: Rate-based filtering helps detect and block high-volume attack traffic, limiting the impact of DDoS attacks.


29. How can network anomaly detection systems identify MITM attacks?

A) By monitoring unusual traffic patterns and unauthorized connections
B) By allowing unrestricted data flow
C) By encrypting all stored data
D) By preventing all incoming connections

Answer: A) By monitoring unusual traffic patterns and unauthorized connections
Explanation: Anomaly detection systems track suspicious behavior, such as unexpected device-to-device communication, to detect MITM threats.


30. What type of encryption should IoT devices use to prevent MITM attacks?

A) End-to-end encryption with TLS
B) Base64 encoding
C) Weak hashing algorithms
D) Plaintext storage

Answer: A) End-to-end encryption with TLS
Explanation: TLS encryption ensures data confidentiality and integrity, preventing MITM interception.


31. Why is IoT threat intelligence important in mitigating MITM and DDoS attacks?

A) It helps predict, detect, and respond to attacks proactively
B) It slows down network speed
C) It removes the need for authentication
D) It weakens security controls

Answer: A) It helps predict, detect, and respond to attacks proactively
Explanation: Threat intelligence helps identify potential threats early, improving security response against MITM and DDoS attacks.


32. Which network security control helps prevent IP spoofing, a technique used in DDoS attacks?

A) Ingress and egress filtering
B) Disabling authentication
C) Allowing unrestricted network access
D) Using outdated network protocols

Answer: A) Ingress and egress filtering
Explanation: Ingress/egress filtering ensures that only legitimate IP traffic enters or leaves the network, preventing IP spoofing-based attacks.


33. What is the primary function of a honeypot in IoT security?

A) Encrypting all network traffic
B) Redirecting attackers to a decoy system for analysis
C) Preventing all external communications
D) Blocking all user connections

Answer: B) Redirecting attackers to a decoy system for analysis
Explanation: Honeypots are decoy systems designed to lure attackers, allowing security teams to analyze attack patterns and methods.


34. How does IoT device fingerprinting help in mitigating MITM and DDoS attacks?

A) By identifying unique device characteristics and detecting anomalies
B) By allowing unrestricted access to all devices
C) By removing security restrictions
D) By preventing encryption

Answer: A) By identifying unique device characteristics and detecting anomalies
Explanation: Device fingerprinting monitors device behavior and characteristics, helping detect unauthorized access and malicious activity.


35. What role does sandboxing play in securing IoT networks?

A) It isolates suspicious applications to prevent system compromise
B) It disables firewall protection
C) It makes IoT devices more vulnerable to MITM attacks
D) It slows down network traffic

Answer: A) It isolates suspicious applications to prevent system compromise
Explanation: Sandboxing runs untrusted applications in an isolated environment, preventing malware infections and attacks.


36. How does IoT network traffic monitoring contribute to security?

A) By detecting anomalies and identifying potential cyber threats
B) By slowing down network communication
C) By disabling encryption to allow easy inspection
D) By allowing all data traffic to pass through unfiltered

Answer: A) By detecting anomalies and identifying potential cyber threats
Explanation: Monitoring network traffic helps detect suspicious patterns, such as MITM interception and DDoS attacks.


37. What is a common sign that an IoT device has been compromised in a DDoS botnet?

A) Unusual high network traffic from the device
B) The device functioning at faster speeds
C) Reduced power consumption
D) Increased battery life

Answer: A) Unusual high network traffic from the device
Explanation: Compromised IoT devices in botnets often generate excessive network traffic, participating in DDoS attacks.


38. Which secure communication protocol should IoT devices use to prevent MITM attacks?

A) DTLS (Datagram Transport Layer Security)
B) Plain HTTP
C) Telnet
D) FTP

Answer: A) DTLS (Datagram Transport Layer Security)
Explanation: DTLS provides end-to-end encryption for UDP-based IoT communication, preventing MITM attacks.


39. What is the primary benefit of implementing AI-driven behavioral analysis in IoT security?

A) It detects and responds to anomalies in real-time
B) It disables device authentication
C) It allows unauthorized access to IoT devices
D) It increases the risk of MITM attacks

Answer: A) It detects and responds to anomalies in real-time
Explanation: AI-driven behavioral analysis helps identify suspicious activities and potential cyber threats before they cause damage.


40. Why should IoT manufacturers implement secure boot mechanisms?

A) To ensure only authorized firmware runs on the device
B) To disable encryption for better performance
C) To prevent users from updating firmware
D) To allow unauthorized access

Answer: A) To ensure only authorized firmware runs on the device
Explanation: Secure boot verifies firmware integrity, preventing malware injection and unauthorized modifications.


41. How does access control lists (ACLs) improve IoT security?

A) By restricting unauthorized access to IoT devices
B) By increasing the bandwidth for attacks
C) By disabling firewalls
D) By allowing unrestricted communication

Answer: A) By restricting unauthorized access to IoT devices
Explanation: ACLs define rules that control which users or devices can access IoT networks, preventing unauthorized connections.


42. What is the main risk of using open Wi-Fi networks for IoT communication?

A) Increased vulnerability to MITM attacks
B) Faster data transmission
C) Stronger encryption
D) Improved device performance

Answer: A) Increased vulnerability to MITM attacks
Explanation: Open Wi-Fi lacks encryption, making IoT devices susceptible to MITM interception and eavesdropping.


43. Which security feature helps prevent IoT firmware tampering?

A) Code signing
B) Default credentials
C) Unrestricted user access
D) Open source firmware

Answer: A) Code signing
Explanation: Digitally signed firmware ensures authenticity, preventing tampering and unauthorized modifications.


44. What is an effective way to defend IoT networks against amplification attacks?

A) Disabling unnecessary network services
B) Increasing the number of open ports
C) Using outdated software
D) Allowing unrestricted traffic

Answer: A) Disabling unnecessary network services
Explanation: Attackers exploit open services for DDoS amplification attacks; disabling unused services reduces risks.


45. What is the role of blockchain technology in IoT security?

A) Providing decentralized and tamper-proof data storage
B) Making IoT communication slower
C) Removing encryption protocols
D) Increasing the likelihood of MITM attacks

Answer: A) Providing decentralized and tamper-proof data storage
Explanation: Blockchain ensures IoT data integrity, preventing unauthorized modifications and MITM attacks.


46. How does fog computing enhance IoT security against DDoS attacks?

A) By distributing processing closer to IoT devices
B) By disabling encryption
C) By increasing reliance on a central cloud server
D) By allowing all traffic without inspection

Answer: A) By distributing processing closer to IoT devices
Explanation: Fog computing reduces network congestion, helping mitigate DDoS attacks by handling traffic locally.


47. Why is regular security auditing important for IoT networks?

A) It identifies vulnerabilities before attackers exploit them
B) It slows down network performance
C) It removes all authentication requirements
D) It increases the risk of MITM attacks

Answer: A) It identifies vulnerabilities before attackers exploit them
Explanation: Regular audits detect weaknesses in IoT security, allowing proactive mitigation of threats.


48. What is an effective way to prevent replay attacks in IoT authentication?

A) Using time-based one-time passwords (TOTP)
B) Disabling authentication
C) Using static encryption keys
D) Allowing plaintext password transmission

Answer: A) Using time-based one-time passwords (TOTP)
Explanation: TOTP ensures authentication tokens are valid for a limited time, preventing replay attacks.


49. What is the risk of using hardcoded credentials in IoT devices?

A) Attackers can easily exploit them for unauthorized access
B) It improves security
C) It increases device performance
D) It makes DDoS attacks impossible

Answer: A) Attackers can easily exploit them for unauthorized access
Explanation: Hardcoded credentials create static vulnerabilities, allowing attackers to exploit multiple devices easily.


50. How does API security play a role in preventing IoT-related attacks?

A) By enforcing authentication and access control
B) By allowing unauthenticated API calls
C) By making APIs public without restrictions
D) By using insecure protocols

Answer: A) By enforcing authentication and access control
Explanation: Secure API authentication prevents unauthorized access and data leaks, reducing MITM and DDoS attack risks.


51. What is the main advantage of using Public Key Infrastructure (PKI) in IoT security?

A) It enables secure authentication and encryption
B) It reduces the need for encryption
C) It makes devices vulnerable to MITM attacks
D) It increases the risk of unauthorized access

Answer: A) It enables secure authentication and encryption
Explanation: PKI ensures secure communication between IoT devices by using digital certificates and encryption to prevent MITM attacks.


52. What is the main function of Network Address Translation (NAT) in IoT security?

A) Hiding internal device IPs from external attackers
B) Disabling firewalls
C) Allowing attackers to access IoT devices remotely
D) Exposing all devices to the internet

Answer: A) Hiding internal device IPs from external attackers
Explanation: NAT masks private IP addresses, making it harder for attackers to directly target IoT devices.


53. What is a primary limitation of IoT security in preventing DDoS attacks?

A) Limited processing power and lack of built-in security features
B) High processing power to detect all attacks
C) Strong encryption by default
D) Automatic attack prevention mechanisms

Answer: A) Limited processing power and lack of built-in security features
Explanation: IoT devices often lack the resources needed for advanced DDoS mitigation and security features.


54. What is a common attack method used in Bluetooth-based MITM attacks?

A) BlueBorne
B) SQL Injection
C) Remote Code Execution
D) DNS Spoofing

Answer: A) BlueBorne
Explanation: BlueBorne exploits Bluetooth vulnerabilities to execute MITM attacks, allowing attackers to intercept and manipulate IoT communications.


55. How does the principle of “Least Functionality” improve IoT security?

A) By restricting devices to only necessary functions
B) By allowing unrestricted device access
C) By enabling all network services
D) By removing security features

Answer: A) By restricting devices to only necessary functions
Explanation: Least Functionality limits the attack surface, reducing risks by disabling unnecessary services that could be exploited.


56. What is the function of DNS sinkholing in preventing IoT-based attacks?

A) Blocking malicious domain connections
B) Increasing network bandwidth
C) Disabling encryption
D) Allowing attackers to resolve DNS requests freely

Answer: A) Blocking malicious domain connections
Explanation: DNS sinkholes redirect malicious domain requests to a safe, non-functional IP, preventing IoT devices from connecting to botnets.


57. Why is UPnP (Universal Plug and Play) a security risk in IoT networks?

A) It automatically exposes IoT devices to external networks
B) It enhances security by encrypting network traffic
C) It prevents all unauthorized access
D) It requires multi-factor authentication

Answer: A) It automatically exposes IoT devices to external networks
Explanation: UPnP allows devices to open ports automatically, increasing the risk of MITM and DDoS attacks.


58. What is an effective method to prevent IoT botnets from launching DDoS attacks?

A) Implementing device whitelisting
B) Allowing all traffic to pass through
C) Using default credentials
D) Disabling encryption

Answer: A) Implementing device whitelisting
Explanation: Device whitelisting ensures only authorized devices can communicate, preventing infected IoT devices from joining botnets.


59. How does implementing an IoT security gateway help prevent MITM and DDoS attacks?

A) It acts as a security filter between IoT devices and external networks
B) It removes authentication requirements
C) It allows unrestricted network access
D) It disables all encryption

Answer: A) It acts as a security filter between IoT devices and external networks
Explanation: IoT security gateways monitor and filter traffic, blocking MITM and DDoS attempts before they reach devices.


60. What is a key benefit of using AI-driven threat intelligence for IoT security?

A) Detecting and responding to attacks in real-time
B) Disabling firewall protections
C) Allowing unrestricted access to IoT networks
D) Slowing down network communication

Answer: A) Detecting and responding to attacks in real-time
Explanation: AI-driven threat intelligence can identify anomalous behavior and prevent attacks dynamically.


61. How does time-based authentication help mitigate MITM attacks?

A) By ensuring authentication tokens expire after a short duration
B) By storing passwords in plaintext
C) By using the same authentication key for all requests
D) By disabling encryption

Answer: A) By ensuring authentication tokens expire after a short duration
Explanation: Time-based authentication limits token lifespan, preventing replay attacks in MITM scenarios.


62. What is the purpose of implementing rate-limiting on IoT devices?

A) To prevent excessive request flooding in DDoS attacks
B) To allow unlimited network requests
C) To slow down legitimate network traffic
D) To disable security controls

Answer: A) To prevent excessive request flooding in DDoS attacks
Explanation: Rate-limiting restricts excessive requests, preventing DDoS attacks from overwhelming IoT networks.


63. How do security patches help prevent MITM and DDoS attacks in IoT devices?

A) By fixing vulnerabilities that attackers exploit
B) By reducing device performance
C) By disabling encryption protocols
D) By allowing all network traffic

Answer: A) By fixing vulnerabilities that attackers exploit
Explanation: Security patches close vulnerabilities, preventing MITM and DDoS exploits on IoT devices.


64. Why is using a VPN beneficial for IoT security?

A) It encrypts IoT device communications to prevent eavesdropping
B) It disables network security features
C) It allows attackers to bypass encryption
D) It slows down legitimate connections

Answer: A) It encrypts IoT device communications to prevent eavesdropping
Explanation: VPNs provide secure, encrypted communication, preventing MITM attacks on IoT networks.


65. What is a major challenge in securing IoT devices against DDoS attacks?

A) IoT devices often lack computational resources for advanced security
B) IoT devices have built-in DDoS prevention mechanisms
C) IoT devices are immune to network attacks
D) DDoS attacks only affect large enterprises

Answer: A) IoT devices often lack computational resources for advanced security
Explanation: Limited processing power in IoT devices makes it difficult to implement robust DDoS protections.


66. What is a side-channel attack in IoT security?

A) Extracting sensitive information from unintended data leaks
B) Directly accessing the device’s user interface
C) Physically stealing the IoT device
D) Encrypting all network traffic

Answer: A) Extracting sensitive information from unintended data leaks
Explanation: Side-channel attacks exploit indirect data leaks (e.g., power usage, electromagnetic emissions) to extract sensitive information.


67. What does Secure Element (SE) technology do for IoT security?

A) It provides hardware-based encryption and secure storage
B) It disables authentication
C) It exposes encryption keys
D) It allows attackers to bypass security

Answer: A) It provides hardware-based encryption and secure storage
Explanation: Secure Elements protect sensitive data from MITM attacks and unauthorized access.


68. Why is role-based access control (RBAC) important in IoT security?

A) It restricts access to specific users based on their roles
B) It removes authentication layers
C) It allows all users full access
D) It disables encryption

Answer: A) It restricts access to specific users based on their roles
Explanation: RBAC ensures users have only the permissions they need, reducing MITM and insider attack risks.


69. What is the purpose of IoT network micro-segmentation?

A) To isolate IoT devices and prevent attack spread
B) To allow all devices to communicate freely
C) To disable network authentication
D) To increase attack surfaces

Answer: A) To isolate IoT devices and prevent attack spread
Explanation: Micro-segmentation limits an attack’s impact by isolating compromised devices.


70. Why is disabling unused network services important for IoT security?

A) It reduces the attack surface by closing unnecessary entry points
B) It increases the device’s exposure to cyber threats
C) It makes the IoT device more accessible to attackers
D) It allows unrestricted network traffic

Answer: A) It reduces the attack surface by closing unnecessary entry points
Explanation: Disabling unused services minimizes the number of attack vectors, reducing the risk of MITM and DDoS attacks.


71. What is a common reason why IoT devices are often targeted in cyberattacks?

A) They typically have weak security configurations and default credentials
B) They have advanced intrusion detection systems
C) They are immune to DDoS attacks
D) They require high processing power to be exploited

Answer: A) They typically have weak security configurations and default credentials
Explanation: Many IoT devices ship with weak security settings, making them easy targets for attackers.


72. How does geofencing enhance IoT security?

A) By restricting device access based on physical location
B) By disabling encryption for faster processing
C) By allowing unauthorized devices to connect remotely
D) By exposing device credentials over the network

Answer: A) By restricting device access based on physical location
Explanation: Geofencing prevents unauthorized access by limiting IoT device operation to specific geographic areas.


73. What is the role of Transport Layer Security (TLS) in IoT communication?

A) Encrypting data to prevent eavesdropping and MITM attacks
B) Allowing unencrypted communication
C) Removing security restrictions
D) Enabling attackers to intercept network traffic

Answer: A) Encrypting data to prevent eavesdropping and MITM attacks
Explanation: TLS ensures secure, encrypted communication between IoT devices and servers, preventing MITM attacks.


74. How can rate-based DDoS protection help mitigate attacks?

A) By limiting excessive traffic from a single source
B) By disabling firewall protection
C) By allowing unlimited traffic requests
D) By exposing network devices

Answer: A) By limiting excessive traffic from a single source
Explanation: Rate-limiting restricts excessive requests, preventing DDoS attacks from overwhelming IoT devices.


75. What is a primary risk of using weak encryption in IoT communication?

A) Data can be intercepted and modified by attackers
B) It prevents MITM attacks
C) It improves security by allowing easy access
D) It strengthens authentication mechanisms

Answer: A) Data can be intercepted and modified by attackers
Explanation: Weak encryption allows attackers to exploit vulnerabilities, enabling MITM attacks and data breaches.


76. How does a firewall help defend against IoT-related cyberattacks?

A) By filtering and blocking malicious traffic
B) By allowing all network traffic to pass through
C) By exposing open ports
D) By disabling encryption

Answer: A) By filtering and blocking malicious traffic
Explanation: Firewalls analyze network traffic, blocking suspicious connections and preventing attacks.


77. Why is using a unique SSID and disabling SSID broadcasting beneficial for IoT security?

A) It reduces the risk of unauthorized network access
B) It allows attackers to connect easily
C) It exposes IoT devices to DDoS attacks
D) It removes all encryption protocols

Answer: A) It reduces the risk of unauthorized network access
Explanation: Hiding SSIDs prevents attackers from easily discovering IoT networks, reducing potential MITM risks.


78. What is a security risk of using MQTT without TLS in IoT networks?

A) It exposes data to MITM attacks
B) It strengthens device authentication
C) It automatically prevents unauthorized access
D) It encrypts all communication by default

Answer: A) It exposes data to MITM attacks
Explanation: MQTT without TLS sends data in plaintext, making it vulnerable to MITM interception.


79. What security feature helps detect and block DDoS botnet traffic?

A) Intrusion Prevention System (IPS)
B) Disabling all encryption protocols
C) Allowing unlimited network connections
D) Using default passwords

Answer: A) Intrusion Prevention System (IPS)
Explanation: IPS detects and blocks suspicious network traffic, preventing DDoS botnets from attacking.


80. What is a common tactic attackers use to perform IoT MITM attacks?

A) Rogue Access Points
B) Enforcing strong authentication
C) Disabling network monitoring
D) Using encrypted communication

Answer: A) Rogue Access Points
Explanation: Attackers set up rogue Wi-Fi hotspots to intercept and manipulate IoT device communication.


81. How can manufacturers improve IoT security against MITM attacks?

A) By enabling secure boot and signed firmware updates
B) By using hardcoded credentials
C) By allowing plaintext authentication
D) By using outdated network protocols

Answer: A) By enabling secure boot and signed firmware updates
Explanation: Secure boot and signed updates prevent unauthorized firmware modifications, reducing MITM risks.


82. What is a potential consequence of failing to segment IoT networks?

A) Attackers can move laterally and compromise multiple devices
B) Improved security by allowing open communication
C) Faster response time to DDoS attacks
D) Reduced risk of malware infections

Answer: A) Attackers can move laterally and compromise multiple devices
Explanation: Without segmentation, attackers can spread malware across IoT networks, causing widespread damage.


83. What security method prevents replay attacks in IoT authentication?

A) Nonces and timestamps
B) Using static passwords
C) Disabling multi-factor authentication
D) Allowing unrestricted authentication attempts

Answer: A) Nonces and timestamps
Explanation: Nonces and timestamps prevent replay attacks by ensuring authentication requests are unique and time-limited.


84. Why is firmware signing important in preventing MITM attacks?

A) It ensures only trusted firmware updates are installed
B) It allows attackers to modify device firmware
C) It exposes encryption keys to the public
D) It removes authentication requirements

Answer: A) It ensures only trusted firmware updates are installed
Explanation: Signed firmware prevents unauthorized modifications, blocking MITM-based firmware attacks.


85. How does deploying honeypots help defend IoT networks?

A) It attracts attackers, allowing security teams to analyze threats
B) It disables encryption
C) It increases network latency
D) It allows attackers to access all network traffic

Answer: A) It attracts attackers, allowing security teams to analyze threats
Explanation: Honeypots act as bait, tricking attackers into revealing their techniques.


86. Why is network segmentation critical in IoT security?

A) It limits the spread of cyberattacks within the network
B) It makes IoT networks more vulnerable to attacks
C) It removes the need for encryption
D) It allows unrestricted access to all devices

Answer: A) It limits the spread of cyberattacks within the network
Explanation: Segmentation isolates IoT devices, preventing attackers from compromising an entire network.


87. What is a key benefit of using machine learning in IoT security?

A) It can detect anomalies and potential cyber threats in real-time
B) It disables network authentication
C) It allows attackers to bypass encryption
D) It makes devices more vulnerable to MITM attacks

Answer: A) It can detect anomalies and potential cyber threats in real-time
Explanation: Machine learning enhances IoT security by identifying unusual patterns and stopping attacks proactively.


88. Why is ensuring IoT devices use randomized session tokens important for security?

A) It prevents session hijacking by making token prediction difficult
B) It allows attackers to easily access IoT networks
C) It weakens authentication mechanisms
D) It removes the need for encryption

Answer: A) It prevents session hijacking by making token prediction difficult
Explanation: Randomized session tokens prevent MITM attacks by ensuring that session identifiers are unpredictable and cannot be easily reused by attackers.


89. How does disabling unnecessary IoT device features improve security?

A) It reduces the number of potential vulnerabilities
B) It makes devices more vulnerable to attacks
C) It prevents devices from operating
D) It allows attackers to easily exploit the device

Answer: A) It reduces the number of potential vulnerabilities
Explanation: Disabling unneeded features limits an attacker’s ability to exploit weaknesses, reducing MITM and DDoS risks.


90. What is the role of a Web Application Firewall (WAF) in securing IoT devices?

A) Filtering malicious traffic targeting IoT web applications
B) Allowing unrestricted device access
C) Disabling all authentication mechanisms
D) Removing encryption requirements

Answer: A) Filtering malicious traffic targeting IoT web applications
Explanation: A WAF helps detect and block suspicious traffic, protecting IoT web applications from MITM and botnet-driven DDoS attacks.


91. What is a key advantage of using elliptic curve cryptography (ECC) for IoT security?

A) Strong encryption with lower computational overhead
B) Increased vulnerability to MITM attacks
C) Slower performance in encryption operations
D) Easier brute-force attacks

Answer: A) Strong encryption with lower computational overhead
Explanation: ECC provides strong encryption with smaller key sizes, making it ideal for resource-constrained IoT devices.


92. How does mutual TLS (mTLS) improve IoT security?

A) By ensuring both client and server authenticate each other
B) By allowing devices to connect without authentication
C) By exposing encryption keys to attackers
D) By allowing plaintext communication

Answer: A) By ensuring both client and server authenticate each other
Explanation: mTLS enhances security by requiring authentication from both parties, preventing MITM attacks.


93. Why should IoT devices be placed on a separate network segment from critical infrastructure?

A) To prevent attackers from easily accessing sensitive systems
B) To allow unrestricted communication between devices
C) To increase exposure to DDoS attacks
D) To make network monitoring harder

Answer: A) To prevent attackers from easily accessing sensitive systems
Explanation: Network segmentation limits the spread of cyberattacks, isolating compromised IoT devices from critical systems.


94. How does anomaly-based intrusion detection help prevent IoT cyberattacks?

A) By identifying unusual behavior that may indicate an attack
B) By allowing all traffic without analysis
C) By disabling device authentication
D) By using static rules instead of AI-based detection

Answer: A) By identifying unusual behavior that may indicate an attack
Explanation: Anomaly-based intrusion detection monitors behavioral deviations, identifying MITM and DDoS threats before they escalate.


95. What is the purpose of Secure Shell (SSH) in IoT security?

A) Providing encrypted remote access to IoT devices
B) Disabling device authentication
C) Allowing attackers to access device logs
D) Exposing IoT device credentials over the network

Answer: A) Providing encrypted remote access to IoT devices
Explanation: SSH encrypts remote access sessions, preventing MITM eavesdropping and unauthorized access.


96. Why is disabling Telnet on IoT devices a critical security measure?

A) Telnet transmits data in plaintext, making it vulnerable to MITM attacks
B) Telnet enhances IoT security
C) Telnet allows strong encryption by default
D) Telnet automatically prevents unauthorized access

Answer: A) Telnet transmits data in plaintext, making it vulnerable to MITM attacks
Explanation: Telnet lacks encryption, making it easy for MITM attackers to intercept login credentials and device data.


97. How does adopting Zero Trust Architecture (ZTA) improve IoT security?

A) By continuously verifying device identities before granting access
B) By allowing unrestricted communication between devices
C) By disabling authentication layers
D) By exposing IoT devices to external networks

Answer: A) By continuously verifying device identities before granting access
Explanation: Zero Trust ensures IoT devices are verified at every access point, reducing MITM and DDoS risks.


98. What role does heuristic analysis play in IoT security monitoring?

A) Detecting new and evolving cyber threats based on behavior patterns
B) Allowing all traffic without inspection
C) Disabling encryption for faster performance
D) Preventing firmware updates

Answer: A) Detecting new and evolving cyber threats based on behavior patterns
Explanation: Heuristic analysis identifies new attack patterns, helping detect previously unknown IoT cyber threats.


99. How does logging and monitoring help mitigate MITM and DDoS attacks in IoT environments?

A) By identifying suspicious activity and potential attack patterns
B) By allowing attackers to remain undetected
C) By disabling all authentication mechanisms
D) By removing security logs automatically

Answer: A) By identifying suspicious activity and potential attack patterns
Explanation: Continuous logging and monitoring help detect MITM and DDoS attempts, allowing for a quick response.


100. Why is automated patch management crucial for IoT security?

A) It ensures devices receive critical security updates in a timely manner
B) It disables encryption
C) It exposes IoT devices to more vulnerabilities
D) It prevents devices from operating

Answer: A) It ensures devices receive critical security updates in a timely manner
Explanation: Automated patching ensures vulnerabilities are fixed quickly, reducing MITM and DDoS attack risks.


101. What is a key security measure to prevent brute-force attacks on IoT authentication systems?

A) Implementing account lockout policies
B) Using default credentials
C) Allowing unlimited login attempts
D) Disabling encryption

Answer: A) Implementing account lockout policies
Explanation: Account lockout policies prevent attackers from making unlimited login attempts, reducing the risk of brute-force attacks on IoT authentication.


102. How does enabling DNS-over-HTTPS (DoH) enhance IoT security?

A) By encrypting DNS queries to prevent interception
B) By exposing all DNS requests to attackers
C) By disabling security monitoring tools
D) By allowing attackers to manipulate DNS responses

Answer: A) By encrypting DNS queries to prevent interception
Explanation: DoH encrypts DNS queries, preventing MITM attacks that exploit unencrypted DNS lookups.


103. Why should IoT devices use ephemeral keys for encryption?

A) To ensure encryption keys are frequently regenerated for security
B) To allow easier key reuse for attackers
C) To weaken device authentication
D) To make encryption less effective

Answer: A) To ensure encryption keys are frequently regenerated for security
Explanation: Ephemeral keys provide forward secrecy, making it difficult for attackers to decrypt past communications even if they compromise one key.


104. What is a primary defense mechanism against MAC address spoofing attacks in IoT networks?

A) Enforcing port security and MAC address filtering
B) Allowing unrestricted MAC addresses on the network
C) Using static encryption keys
D) Disabling authentication

Answer: A) Enforcing port security and MAC address filtering
Explanation: MAC address filtering and port security prevent unauthorized devices from accessing the network, reducing the risk of MITM attacks.


105. How does implementing asymmetric cryptography enhance IoT security?

A) By using a public-private key pair for secure communication
B) By allowing all devices to share the same encryption key
C) By storing plaintext passwords in the firmware
D) By exposing private keys to all devices

Answer: A) By using a public-private key pair for secure communication
Explanation: Asymmetric cryptography ensures secure authentication and communication using public-private key encryption, preventing MITM attacks.


106. Why should IoT devices support over-the-air (OTA) updates with authentication?

A) To securely update firmware without allowing unauthorized modifications
B) To disable all encryption during updates
C) To allow attackers to install malicious firmware
D) To prevent devices from receiving updates

Answer: A) To securely update firmware without allowing unauthorized modifications
Explanation: Authenticated OTA updates prevent attackers from injecting malicious firmware, reducing vulnerabilities.


107. How does a software-defined perimeter (SDP) improve IoT security?

A) By restricting network access based on user identity and context
B) By allowing unrestricted access to all devices
C) By disabling encryption protocols
D) By exposing IoT devices to external networks

Answer: A) By restricting network access based on user identity and context
Explanation: SDP ensures that only authenticated and authorized users/devices can access IoT networks, reducing MITM risks.


108. What security risk arises from improper session termination in IoT applications?

A) Attackers can hijack sessions and gain unauthorized access
B) Improved authentication mechanisms
C) Reduced likelihood of MITM attacks
D) Faster network speeds

Answer: A) Attackers can hijack sessions and gain unauthorized access
Explanation: Failing to properly terminate sessions can lead to session hijacking, allowing attackers to take control of an active user session.


109. What is the purpose of implementing network time synchronization in IoT security?

A) To prevent replay attacks by ensuring time-sensitive authentication
B) To disable network encryption
C) To allow attackers to manipulate timestamps
D) To make devices more vulnerable to MITM attacks

Answer: A) To prevent replay attacks by ensuring time-sensitive authentication
Explanation: Proper time synchronization ensures that security mechanisms relying on timestamps, such as one-time passwords (OTP), function correctly to prevent replay attacks.


110. How does disabling ICMP requests improve IoT network security?

A) By preventing network reconnaissance and DDoS amplification attacks
B) By increasing the risk of MITM attacks
C) By allowing attackers to easily map the network
D) By exposing device IPs to the public

Answer: A) By preventing network reconnaissance and DDoS amplification attacks
Explanation: Disabling ICMP requests helps prevent ping sweeps and ICMP-based DDoS amplification attacks.


111. What role does digital forensics play in IoT security?

A) Investigating security incidents and identifying attack sources
B) Preventing attackers from launching MITM attacks
C) Disabling encryption for analysis
D) Allowing attackers to erase logs

Answer: A) Investigating security incidents and identifying attack sources
Explanation: Digital forensics helps analyze security breaches, identify attack origins, and provide evidence for mitigation.


112. Why should IoT devices avoid using predictable identifiers, such as sequential serial numbers?

A) Attackers can use them to guess device credentials and exploit vulnerabilities
B) It strengthens authentication
C) It prevents unauthorized access
D) It reduces the attack surface

Answer: A) Attackers can use them to guess device credentials and exploit vulnerabilities
Explanation: Sequential identifiers make it easier for attackers to enumerate and exploit IoT devices.


113. How does physical security contribute to IoT network security?

A) By preventing unauthorized physical access to devices
B) By making devices more vulnerable to MITM attacks
C) By allowing unrestricted remote access
D) By exposing encryption keys to attackers

Answer: A) By preventing unauthorized physical access to devices
Explanation: Physical security measures, such as locking IoT hardware, prevent tampering and unauthorized access.


114. What type of cyberattack exploits vulnerabilities in IoT device APIs?

A) API injection attacks
B) Brute-force attacks
C) DNS spoofing
D) Ping floods

Answer: A) API injection attacks
Explanation: API injection attacks exploit weak API security, allowing attackers to execute unauthorized commands on IoT devices.


115. What is the risk of allowing open remote access protocols (e.g., VNC, RDP) on IoT devices?

A) Attackers can exploit them to gain full device control
B) It strengthens authentication
C) It prevents unauthorized access
D) It makes devices immune to MITM attacks

Answer: A) Attackers can exploit them to gain full device control
Explanation: Open remote access protocols expose IoT devices to unauthorized access, increasing the risk of MITM and DDoS attacks.


116. Why is endpoint detection and response (EDR) important for IoT security?

A) It monitors, detects, and responds to security incidents in real-time
B) It disables encryption
C) It prevents device authentication
D) It allows attackers to bypass security controls

Answer: A) It monitors, detects, and responds to security incidents in real-time
Explanation: EDR solutions continuously monitor IoT endpoints, detecting and mitigating potential attacks.


117. How can IoT device owners protect against SIM swapping attacks?

A) By enabling multi-factor authentication (MFA) for SIM-related services
B) By disabling authentication altogether
C) By allowing unrestricted access to mobile networks
D) By using static passwords

Answer: A) By enabling multi-factor authentication (MFA) for SIM-related services
Explanation: MFA protects IoT-connected mobile devices from unauthorized SIM swaps, preventing account takeovers.


118. What is the purpose of using honeynets in IoT security?

A) To detect, analyze, and divert cyber threats targeting IoT devices
B) To remove encryption from IoT networks
C) To allow attackers unrestricted access to the network
D) To prevent legitimate users from accessing the IoT devices

Answer: A) To detect, analyze, and divert cyber threats targeting IoT devices
Explanation: Honeynets are networks of honeypots designed to attract and study cyber threats, helping security teams identify MITM and DDoS attack techniques.


119. Why should IoT networks enforce application-layer filtering?

A) To inspect and block malicious traffic at the application level
B) To allow unrestricted access to all applications
C) To disable encryption mechanisms
D) To improve network speed by removing security checks

Answer: A) To inspect and block malicious traffic at the application level
Explanation: Application-layer filtering prevents malware, unauthorized access, and suspicious activities by analyzing data packets before they reach IoT devices.


120. What is the main risk of using outdated encryption algorithms in IoT devices?

A) They can be cracked by attackers, leading to data breaches and MITM attacks
B) They make IoT devices immune to cyberattacks
C) They provide better performance than modern encryption
D) They disable authentication mechanisms

Answer: A) They can be cracked by attackers, leading to data breaches and MITM attacks
Explanation: Weak encryption algorithms (e.g., MD5, SHA-1) are vulnerable to cryptographic attacks, allowing attackers to compromise IoT communication.


121. How does Secure Boot protect IoT devices from MITM attacks?

A) By verifying that only trusted firmware and software can run on the device
B) By allowing unrestricted access to the device
C) By disabling device authentication
D) By exposing encryption keys

Answer: A) By verifying that only trusted firmware and software can run on the device
Explanation: Secure Boot ensures that IoT devices only execute digitally signed and verified firmware, preventing MITM-based firmware injection attacks.


122. What is a key reason why attackers target IoT devices for botnet recruitment?

A) Many IoT devices have weak security and are always online
B) IoT devices are immune to malware
C) IoT devices do not connect to the internet
D) IoT devices automatically prevent cyberattacks

Answer: A) Many IoT devices have weak security and are always online
Explanation: Weak security configurations and constant internet connectivity make IoT devices easy targets for DDoS botnets.


123. What is the benefit of using network-layer encryption in IoT communication?

A) It ensures that data remains protected while in transit
B) It removes security restrictions from IoT devices
C) It disables authentication requirements
D) It prevents IoT devices from communicating

Answer: A) It ensures that data remains protected while in transit
Explanation: Network-layer encryption (e.g., IPsec, VPNs) protects IoT data from MITM attacks by securing communication channels.


124. How does fog computing enhance IoT security against DDoS attacks?

A) By distributing processing and filtering attack traffic at the network edge
B) By disabling encryption on IoT devices
C) By allowing all traffic through without inspection
D) By exposing IoT device credentials

Answer: A) By distributing processing and filtering attack traffic at the network edge
Explanation: Fog computing reduces the impact of DDoS attacks by processing traffic closer to IoT devices, preventing network congestion.


125. What is a significant risk of exposing IoT devices to public IP addresses?

A) Attackers can scan and exploit them remotely
B) It strengthens device authentication
C) It prevents DDoS attacks
D) It ensures IoT devices are always updated

Answer: A) Attackers can scan and exploit them remotely
Explanation: Publicly exposed IoT devices are at high risk of cyberattacks, including MITM, DDoS, and unauthorized access.


126. How does behavioral analysis help detect IoT cyber threats?

A) By identifying unusual device activity and blocking suspicious behavior
B) By allowing all traffic through without inspection
C) By disabling encryption on IoT devices
D) By exposing encryption keys

Answer: A) By identifying unusual device activity and blocking suspicious behavior
Explanation: Behavioral analysis uses AI and machine learning to detect anomalous activities, helping prevent MITM and DDoS attacks.


127. What is a potential risk of not changing default IoT device credentials?

A) Attackers can easily gain access using known default passwords
B) It improves device performance
C) It strengthens encryption mechanisms
D) It prevents network attacks

Answer: A) Attackers can easily gain access using known default passwords
Explanation: Default credentials are widely known and exploited in large-scale IoT botnet attacks, such as Mirai.


128. How does implementing AI-driven adaptive security improve IoT defense mechanisms?

A) By continuously learning and adjusting security measures in real-time
B) By disabling encryption to improve performance
C) By allowing unrestricted network access
D) By preventing IoT devices from receiving updates

Answer: A) By continuously learning and adjusting security measures in real-time
Explanation: AI-driven adaptive security systems detect evolving threats and adjust security defenses dynamically, improving protection against MITM and DDoS attacks.


129. Why should IoT devices avoid using hardcoded encryption keys?

A) Hardcoded keys can be extracted and reused by attackers
B) They strengthen encryption
C) They prevent unauthorized access
D) They improve device efficiency

Answer: A) Hardcoded keys can be extracted and reused by attackers
Explanation: Hardcoded encryption keys are a major security risk because attackers can reverse-engineer firmware to extract them, leading to MITM and unauthorized access.


130. How does microsegmentation improve IoT network security?

A) By isolating IoT devices into smaller security zones to prevent lateral movement of threats
B) By allowing all IoT devices to communicate freely
C) By exposing device credentials to the network
D) By disabling security controls

Answer: A) By isolating IoT devices into smaller security zones to prevent lateral movement of threats
Explanation: Microsegmentation enhances security by dividing IoT networks into secure segments, preventing MITM and DDoS attacks from spreading.


131. What is a primary reason why IoT botnets are effective for launching DDoS attacks?

A) IoT devices are often unsecured and have high uptime
B) IoT devices automatically block DDoS attempts
C) IoT devices have built-in security to prevent botnet attacks
D) IoT devices only operate within secure private networks

Answer: A) IoT devices are often unsecured and have high uptime
Explanation: Many IoT devices are always online and lack strong security, making them easy targets for botnet infections and DDoS attacks.


132. How does implementing device-to-device authentication enhance IoT security?

A) It ensures only authorized devices communicate with each other
B) It disables encryption to improve performance
C) It allows attackers to gain unauthorized access
D) It prevents IoT devices from communicating

Answer: A) It ensures only authorized devices communicate with each other
Explanation: Device-to-device authentication prevents unauthorized access, reducing the risk of MITM and botnet infiltration.


133. What is an effective countermeasure against IoT-based DNS amplification attacks?

A) Rate-limiting and DNS request filtering
B) Allowing unrestricted DNS queries
C) Disabling firewall protection
D) Using weak encryption

Answer: A) Rate-limiting and DNS request filtering
Explanation: Rate-limiting and filtering DNS traffic prevent attackers from using IoT devices for DNS amplification DDoS attacks.


134. What security mechanism ensures IoT firmware integrity before execution?

A) Secure Boot
B) Plaintext authentication
C) Hardcoded encryption keys
D) Public access to firmware

Answer: A) Secure Boot
Explanation: Secure Boot verifies firmware signatures before execution, preventing malicious firmware tampering and MITM attacks.


135. What is the role of Security Information and Event Management (SIEM) in IoT security?

A) It provides real-time threat detection and incident response
B) It disables all security mechanisms
C) It removes encryption from IoT networks
D) It allows attackers to erase device logs

Answer: A) It provides real-time threat detection and incident response
Explanation: SIEM collects, analyzes, and alerts on security events, helping detect DDoS, MITM, and unauthorized access attempts.


136. How does identity-based access control improve IoT security?

A) By restricting access based on verified user/device identities
B) By allowing all devices unrestricted access
C) By exposing credentials to attackers
D) By disabling encryption

Answer: A) By restricting access based on verified user/device identities
Explanation: Identity-based access control ensures only authenticated users and devices can access IoT resources, reducing security risks.


137. What type of attack exploits insecure IoT APIs?

A) API injection attacks
B) DNS spoofing
C) Physical tampering
D) ICMP flooding

Answer: A) API injection attacks
Explanation: Poorly secured APIs can be exploited through injection attacks, allowing attackers to manipulate IoT devices remotely.


138. How does hardware-based security improve IoT defense against MITM attacks?

A) It provides secure key storage and tamper resistance
B) It disables network encryption
C) It prevents IoT devices from functioning
D) It allows attackers to inject malicious firmware

Answer: A) It provides secure key storage and tamper resistance
Explanation: Hardware security modules (HSMs) and Trusted Platform Modules (TPMs) protect sensitive cryptographic keys from attackers.


139. What is a major risk of using insecure MQTT brokers in IoT communication?

A) Attackers can intercept and manipulate IoT messages
B) It strengthens network security
C) It prevents MITM attacks
D) It improves encryption mechanisms

Answer: A) Attackers can intercept and manipulate IoT messages
Explanation: Unsecured MQTT brokers allow attackers to eavesdrop or manipulate IoT device communication, leading to MITM attacks.


140. How does deploying deception technology improve IoT security?

A) By misleading attackers and gathering intelligence on threats
B) By allowing all network traffic through
C) By removing authentication requirements
D) By disabling encryption

Answer: A) By misleading attackers and gathering intelligence on threats
Explanation: Deception technology deploys fake assets to confuse attackers, allowing security teams to detect and analyze threats.


141. What role does log analysis play in preventing IoT DDoS attacks?

A) It helps detect unusual traffic spikes indicative of an attack
B) It disables firewall protection
C) It allows attackers to modify security policies
D) It exposes sensitive device logs

Answer: A) It helps detect unusual traffic spikes indicative of an attack
Explanation: Analyzing logs helps identify abnormal traffic patterns, allowing early mitigation of DDoS attacks.


142. How does enforcing a zero-trust model improve IoT security?

A) By requiring authentication for every access request
B) By allowing unrestricted network access
C) By disabling encryption
D) By exposing IoT credentials to attackers

Answer: A) By requiring authentication for every access request
Explanation: Zero-trust ensures that no device or user is automatically trusted, reducing MITM and unauthorized access risks.


143. What is a common attack method used against weak IoT authentication systems?

A) Credential stuffing
B) Firewall hardening
C) Secure Boot enforcement
D) TLS encryption

Answer: A) Credential stuffing
Explanation: Attackers use stolen credentials from data breaches to gain unauthorized access to IoT devices.


144. Why is rate limiting essential in IoT network security?

A) It prevents excessive requests that could lead to DDoS attacks
B) It disables encryption to improve performance
C) It allows unrestricted device access
D) It exposes device vulnerabilities

Answer: A) It prevents excessive requests that could lead to DDoS attacks
Explanation: Rate limiting restricts the number of requests a device or user can send, reducing DDoS risks.


145. How does an Intrusion Prevention System (IPS) enhance IoT security?

A) By blocking malicious traffic in real time
B) By allowing all traffic through without inspection
C) By disabling encryption
D) By exposing device vulnerabilities

Answer: A) By blocking malicious traffic in real time
Explanation: IPS actively prevents suspicious activities, protecting IoT networks from MITM, DDoS, and malware attacks.


146. How does enforcing MFA (Multi-Factor Authentication) on IoT devices reduce security risks?

A) By requiring additional authentication steps beyond passwords
B) By disabling encryption
C) By allowing unauthorized access
D) By preventing firmware updates

Answer: A) By requiring additional authentication steps beyond passwords
Explanation: MFA strengthens authentication by adding extra verification layers, preventing unauthorized access.


147. What security feature ensures the confidentiality of IoT communication?

A) End-to-end encryption
B) Default usernames and passwords
C) Open communication protocols
D) Plaintext data transmission

Answer: A) End-to-end encryption
Explanation: End-to-end encryption secures data in transit, preventing MITM attacks.


148. What is the primary risk of exposing IoT devices to unsecured cloud APIs?

A) Attackers can intercept and manipulate IoT data
B) It prevents MITM attacks
C) It strengthens security by removing authentication
D) It improves encryption

Answer: A) Attackers can intercept and manipulate IoT data
Explanation: Unsecured APIs expose IoT data to attackers, leading to MITM and unauthorized data access.


149. How does anomaly detection prevent IoT-based cyberattacks?

A) By identifying deviations from normal behavior
B) By disabling encryption
C) By exposing device vulnerabilities
D) By preventing security patches

Answer: A) By identifying deviations from normal behavior
Explanation: Anomaly detection tools monitor IoT devices for suspicious activity, allowing early attack detection.


150. How does firmware integrity verification improve IoT security?

A) By ensuring that only authentic firmware is installed
B) By allowing attackers to modify firmware
C) By exposing encryption keys
D) By disabling device authentication

Answer: A) By ensuring that only authentic firmware is installed
Explanation: Verifying firmware integrity prevents unauthorized modifications, reducing the risk of MITM and malware attacks.


151. How does disabling Telnet and enabling SSH improve IoT security?

A) SSH encrypts communication, preventing MITM attacks
B) Telnet provides stronger encryption than SSH
C) SSH allows attackers to intercept plaintext credentials
D) Telnet is required for secure IoT communication

Answer: A) SSH encrypts communication, preventing MITM attacks
Explanation: Telnet transmits data in plaintext, making it vulnerable to MITM attacks, whereas SSH provides encrypted communication, improving security.


152. Why is implementing API rate limiting important for IoT security?

A) It helps prevent API abuse and DDoS attacks
B) It allows attackers unlimited access to APIs
C) It removes authentication requirements
D) It weakens encryption mechanisms

Answer: A) It helps prevent API abuse and DDoS attacks
Explanation: Rate limiting restricts excessive API requests, reducing the risk of DDoS attacks and brute-force attempts on IoT APIs.


153. What is a key benefit of enabling Mutual TLS (mTLS) in IoT networks?

A) It authenticates both client and server, preventing MITM attacks
B) It allows attackers to decrypt traffic easily
C) It disables encryption for faster communication
D) It removes authentication from IoT networks

Answer: A) It authenticates both client and server, preventing MITM attacks
Explanation: mTLS ensures that both IoT devices and servers verify each other’s identity, preventing unauthorized access and MITM attacks.


154. Why is it crucial to disable unnecessary open ports on IoT devices?

A) Open ports can be exploited for remote attacks and malware injection
B) Open ports improve IoT device security
C) Open ports allow attackers to secure the device
D) Open ports are needed for encryption

Answer: A) Open ports can be exploited for remote attacks and malware injection
Explanation: Attackers scan for open ports to find vulnerabilities, enabling MITM, DDoS, and botnet infections on IoT devices.


155. What is the purpose of implementing time-based one-time passwords (TOTP) in IoT authentication?

A) To prevent replay attacks and unauthorized access
B) To store static passwords for later use
C) To disable encryption temporarily
D) To allow attackers to bypass authentication

Answer: A) To prevent replay attacks and unauthorized access
Explanation: TOTP generates short-lived authentication codes, preventing attackers from reusing stolen credentials in MITM attacks.


156. How does disabling unused network services help mitigate IoT security risks?

A) It reduces the attack surface by limiting potential entry points
B) It slows down the device performance
C) It removes all security restrictions
D) It allows attackers to access the system more easily

Answer: A) It reduces the attack surface by limiting potential entry points
Explanation: Disabling unused services prevents attackers from exploiting unnecessary vulnerabilities, reducing security risks.


157. Why should IoT devices use randomized MAC addresses when connecting to networks?

A) To prevent tracking and spoofing attacks
B) To allow attackers to track devices easily
C) To disable encryption on wireless connections
D) To expose device credentials

Answer: A) To prevent tracking and spoofing attacks
Explanation: Randomized MAC addresses help prevent unauthorized tracking and MAC spoofing attacks, improving IoT privacy and security.


158. How does enforcing device whitelisting improve IoT network security?

A) It allows only authorized devices to connect to the network
B) It weakens network authentication
C) It exposes devices to MITM attacks
D) It removes all encryption methods

Answer: A) It allows only authorized devices to connect to the network
Explanation: Whitelisting ensures that only approved devices can communicate, reducing the risk of unauthorized access and DDoS botnet infections.


159. What is the risk of not validating IoT firmware updates?

A) Attackers can inject malicious firmware to gain control of the device
B) It enhances device security
C) It prevents MITM attacks
D) It speeds up the update process

Answer: A) Attackers can inject malicious firmware to gain control of the device
Explanation: Unvalidated firmware updates can introduce malware, allowing attackers to compromise IoT devices.


160. Why is network segmentation an essential security strategy for IoT?

A) It isolates IoT devices from critical systems, preventing attack spread
B) It slows down network traffic
C) It allows attackers to move freely between devices
D) It exposes encryption keys

Answer: A) It isolates IoT devices from critical systems, preventing attack spread
Explanation: Segmenting IoT networks helps contain cyberattacks, ensuring that compromised devices cannot affect the entire network.


161. What is a common method attackers use to eavesdrop on IoT communications?

A) Packet sniffing
B) Secure Boot
C) Firmware integrity checks
D) TLS encryption

Answer: A) Packet sniffing
Explanation: Attackers use packet sniffing tools to intercept unencrypted IoT traffic, leading to MITM attacks and data theft.


162. Why is using a VPN beneficial for IoT devices?

A) It encrypts traffic, protecting against MITM attacks
B) It disables device authentication
C) It exposes device credentials
D) It allows attackers to manipulate encrypted data

Answer: A) It encrypts traffic, protecting against MITM attacks
Explanation: VPNs create secure tunnels for IoT communications, reducing the risk of MITM attacks and eavesdropping.


163. How does AI-driven security analytics improve IoT threat detection?

A) It identifies abnormal behavior and potential attacks in real time
B) It disables all network security features
C) It removes device authentication
D) It exposes encryption keys

Answer: A) It identifies abnormal behavior and potential attacks in real time
Explanation: AI-driven security analytics detect deviations in IoT device behavior, allowing proactive threat mitigation.


164. What is a key security measure to prevent IoT devices from becoming part of a botnet?

A) Regular firmware updates and strong authentication
B) Disabling all network security protocols
C) Using hardcoded passwords
D) Allowing unrestricted network access

Answer: A) Regular firmware updates and strong authentication
Explanation: Keeping firmware updated and enforcing strong authentication prevents IoT devices from being hijacked into botnets.


165. Why is real-time monitoring critical for IoT security?

A) It detects and responds to threats as they occur
B) It allows attackers to go undetected
C) It weakens security policies
D) It removes the need for authentication

Answer: A) It detects and responds to threats as they occur
Explanation: Real-time monitoring enables immediate detection of suspicious activities, reducing the impact of MITM and DDoS attacks.


166. How does enforcing HTTP Strict Transport Security (HSTS) help secure IoT web communications?

A) It forces HTTPS connections, preventing MITM attacks
B) It removes all authentication mechanisms
C) It allows plaintext communication
D) It disables encryption

Answer: A) It forces HTTPS connections, preventing MITM attacks
Explanation: HSTS ensures that IoT web applications always use secure HTTPS connections, blocking MITM downgrade attacks.


167. What is the purpose of security logging in IoT devices?

A) To record security events and detect anomalies
B) To allow attackers to erase logs
C) To disable authentication mechanisms
D) To increase attack surfaces

Answer: A) To record security events and detect anomalies
Explanation: Security logs provide valuable data for detecting and investigating cyber threats.


168. How does enabling certificate pinning enhance IoT security?

A) It prevents attackers from using forged certificates in MITM attacks
B) It disables encryption to speed up communication
C) It allows devices to accept any certificate for authentication
D) It removes authentication requirements for IoT devices

Answer: A) It prevents attackers from using forged certificates in MITM attacks
Explanation: Certificate pinning ensures that IoT devices only trust predefined, valid certificates, preventing MITM attacks using fake SSL certificates.


169. What is the purpose of using Data Loss Prevention (DLP) tools in IoT security?

A) To prevent unauthorized data leakage from IoT devices
B) To disable encryption
C) To allow unrestricted data flow across networks
D) To expose sensitive information

Answer: A) To prevent unauthorized data leakage from IoT devices
Explanation: DLP tools monitor and prevent the unauthorized transfer of sensitive data, ensuring IoT security against data breaches.


170. Why should IoT device manufacturers implement hardware-based security modules?

A) To store cryptographic keys securely and prevent unauthorized access
B) To expose encryption keys for easy access
C) To remove authentication mechanisms
D) To allow plaintext communication

Answer: A) To store cryptographic keys securely and prevent unauthorized access
Explanation: Hardware-based security modules, such as TPMs (Trusted Platform Modules), securely store encryption keys, reducing the risk of MITM attacks.


171. How does disabling weak cipher suites improve IoT security?

A) It prevents attackers from exploiting weak encryption algorithms
B) It allows attackers to break encryption more easily
C) It weakens device authentication
D) It removes the need for secure communication

Answer: A) It prevents attackers from exploiting weak encryption algorithms
Explanation: Disabling weak cipher suites ensures that IoT devices use strong encryption, preventing MITM attacks and cryptographic exploits.


172. What is a key advantage of using DNSSEC in IoT security?

A) It protects against DNS spoofing and MITM attacks
B) It weakens encryption
C) It allows attackers to modify DNS records
D) It removes authentication for DNS lookups

Answer: A) It protects against DNS spoofing and MITM attacks
Explanation: DNSSEC ensures the integrity of DNS responses, preventing attackers from redirecting IoT devices to malicious domains.


173. What is the primary function of a network honeypot in IoT security?

A) To lure and analyze cyberattacks targeting IoT networks
B) To disable network security controls
C) To allow attackers unrestricted access to the network
D) To prevent IoT devices from operating

Answer: A) To lure and analyze cyberattacks targeting IoT networks
Explanation: Honeypots act as decoys, helping security teams study MITM, DDoS, and other attack methods used against IoT devices.


174. Why is it essential to monitor outbound traffic from IoT devices?

A) To detect compromised devices participating in botnet attacks
B) To disable encryption
C) To expose sensitive information
D) To allow unrestricted data flow

Answer: A) To detect compromised devices participating in botnet attacks
Explanation: Unusual outbound traffic may indicate that an IoT device is infected and being used in a DDoS botnet, requiring immediate mitigation.


175. What role does a Next-Generation Firewall (NGFW) play in IoT security?

A) It provides deep packet inspection and intrusion prevention
B) It disables security monitoring
C) It allows unrestricted traffic flow
D) It removes authentication requirements

Answer: A) It provides deep packet inspection and intrusion prevention
Explanation: NGFWs enhance IoT security by analyzing and blocking suspicious network traffic, reducing MITM and DDoS risks.


176. How does adopting software-defined networking (SDN) improve IoT security?

A) It allows dynamic security policies and better network segmentation
B) It disables encryption
C) It removes authentication mechanisms
D) It allows attackers to bypass network security

Answer: A) It allows dynamic security policies and better network segmentation
Explanation: SDN provides centralized control over network security policies, enabling better protection against MITM and DDoS attacks.


177. What is a primary risk of using plaintext protocols (e.g., HTTP, FTP) in IoT networks?

A) Data can be intercepted by attackers using MITM techniques
B) It strengthens device authentication
C) It prevents unauthorized access
D) It enhances network performance

Answer: A) Data can be intercepted by attackers using MITM techniques
Explanation: Plaintext protocols expose IoT communication to MITM attacks, allowing attackers to steal or manipulate data.


178. How does AI-powered anomaly detection improve IoT security?

A) It identifies unusual device behavior and detects threats in real time
B) It disables network security features
C) It removes authentication mechanisms
D) It allows attackers to bypass encryption

Answer: A) It identifies unusual device behavior and detects threats in real time
Explanation: AI-powered security systems analyze IoT network traffic, detecting anomalies that may indicate MITM or DDoS attacks.


179. What is a major security risk of using legacy IoT devices?

A) They may contain unpatched vulnerabilities and weak security mechanisms
B) They are immune to cyberattacks
C) They automatically prevent MITM attacks
D) They provide stronger encryption than modern devices

Answer: A) They may contain unpatched vulnerabilities and weak security mechanisms
Explanation: Legacy IoT devices often lack firmware updates and strong encryption, making them vulnerable to MITM and DDoS exploits.


180. How does implementing Zero Trust Network Access (ZTNA) enhance IoT security?

A) It ensures continuous verification of devices before granting access
B) It removes security restrictions
C) It weakens authentication mechanisms
D) It allows unrestricted access to IoT networks

Answer: A) It ensures continuous verification of devices before granting access
Explanation: ZTNA enforces strict authentication and authorization for every access attempt, reducing the risk of MITM, unauthorized access, and botnet attacks.


181. Why is enforcing role-based access control (RBAC) important in IoT security?

A) It restricts access to IoT resources based on user roles and permissions
B) It allows unrestricted access to all users
C) It removes authentication requirements
D) It weakens network security

Answer: A) It restricts access to IoT resources based on user roles and permissions
Explanation: RBAC ensures that only authorized users have access to specific IoT resources, reducing the risk of MITM and unauthorized access attacks.


182. What is a significant security risk of using static encryption keys in IoT communication?

A) If compromised, attackers can decrypt all communications
B) It prevents MITM attacks
C) It enhances authentication mechanisms
D) It automatically prevents brute-force attacks

Answer: A) If compromised, attackers can decrypt all communications
Explanation: Using static encryption keys makes IoT communication vulnerable to cryptographic attacks, as a single key compromise can lead to full data exposure.


183. How does implementing security patches promptly improve IoT device security?

A) It fixes vulnerabilities before attackers can exploit them
B) It weakens encryption
C) It increases the risk of MITM attacks
D) It removes authentication requirements

Answer: A) It fixes vulnerabilities before attackers can exploit them
Explanation: Regular security patches close known security flaws, preventing attackers from exploiting vulnerabilities in IoT devices.


184. Why should IoT networks implement egress filtering?

A) To prevent compromised devices from communicating with external attackers
B) To allow unrestricted data transfer
C) To disable encryption protocols
D) To expose internal network configurations

Answer: A) To prevent compromised devices from communicating with external attackers
Explanation: Egress filtering blocks unauthorized outbound traffic, preventing IoT botnets from launching DDoS attacks.


185. What is the primary function of IoT endpoint detection and response (EDR) solutions?

A) To detect and mitigate security threats on IoT devices in real time
B) To disable security controls
C) To expose device credentials to attackers
D) To allow unrestricted device access

Answer: A) To detect and mitigate security threats on IoT devices in real time
Explanation: EDR continuously monitors IoT devices, detecting malware, unauthorized access, and potential MITM/DDoS threats.


186. How does disabling JavaScript execution on IoT management interfaces improve security?

A) It prevents Cross-Site Scripting (XSS) and browser-based MITM attacks
B) It enhances device authentication
C) It removes all encryption protocols
D) It allows attackers to execute arbitrary code

Answer: A) It prevents Cross-Site Scripting (XSS) and browser-based MITM attacks
Explanation: Disabling JavaScript on IoT management interfaces prevents XSS attacks, reducing the risk of session hijacking and MITM exploits.


187. Why should IoT devices enforce strict input validation?

A) To prevent command injection and buffer overflow attacks
B) To allow unrestricted access to device settings
C) To remove authentication requirements
D) To expose device firmware to attackers

Answer: A) To prevent command injection and buffer overflow attacks
Explanation: Strict input validation ensures that malicious code cannot be executed, preventing various cyber threats, including MITM and DDoS exploits.


188. What is the purpose of using an IoT security gateway?

A) To filter, encrypt, and protect data traffic between IoT devices and networks
B) To disable authentication for ease of access
C) To remove encryption from IoT communications
D) To allow attackers unrestricted network access

Answer: A) To filter, encrypt, and protect data traffic between IoT devices and networks
Explanation: IoT security gateways provide an additional layer of protection, preventing MITM attacks and unauthorized access.


189. How does implementing a secure enclave enhance IoT security?

A) It provides an isolated environment for executing sensitive operations
B) It allows all processes to run without security checks
C) It disables device authentication
D) It allows attackers to modify firmware

Answer: A) It provides an isolated environment for executing sensitive operations
Explanation: Secure enclaves protect cryptographic keys and critical operations, preventing MITM attacks and data theft.


190. Why should IoT administrators disable weak SNMP (Simple Network Management Protocol) versions?

A) Older SNMP versions transmit data in plaintext, making them vulnerable to MITM attacks
B) They provide stronger encryption than newer versions
C) They improve IoT device security
D) They prevent brute-force attacks

Answer: A) Older SNMP versions transmit data in plaintext, making them vulnerable to MITM attacks
Explanation: Weak SNMP versions (e.g., SNMPv1, SNMPv2) lack encryption, exposing IoT device configurations to MITM attackers.


191. How does implementing geo-blocking improve IoT security?

A) It prevents unauthorized access from high-risk geographical regions
B) It weakens encryption mechanisms
C) It allows attackers unrestricted access
D) It removes all authentication protocols

Answer: A) It prevents unauthorized access from high-risk geographical regions
Explanation: Geo-blocking restricts access from untrusted locations, reducing exposure to MITM and DDoS attacks from malicious networks.


192. What is the role of a SIEM (Security Information and Event Management) system in IoT security?

A) To collect and analyze security logs for real-time threat detection
B) To disable encryption and authentication
C) To expose device logs to attackers
D) To allow all network traffic without filtering

Answer: A) To collect and analyze security logs for real-time threat detection
Explanation: SIEM solutions provide centralized monitoring of IoT security events, helping detect and respond to MITM and DDoS threats.


193. Why is implementing a Content Security Policy (CSP) beneficial for IoT web applications?

A) It helps prevent Cross-Site Scripting (XSS) and browser-based attacks
B) It removes authentication requirements
C) It disables encryption
D) It allows attackers to inject malicious scripts

Answer: A) It helps prevent Cross-Site Scripting (XSS) and browser-based attacks
Explanation: CSP restricts the execution of untrusted scripts, protecting IoT web interfaces from MITM and XSS attacks.


194. How does adopting a “deny by default” firewall rule improve IoT security?

A) It blocks all traffic unless explicitly allowed, reducing attack exposure
B) It allows unrestricted traffic through the network
C) It weakens device authentication
D) It removes encryption from communication

Answer: A) It blocks all traffic unless explicitly allowed, reducing attack exposure
Explanation: A ‘deny by default’ firewall approach limits IoT device exposure, preventing unauthorized access and MITM attacks.


195. How does adopting edge computing improve IoT security against DDoS attacks?

A) It reduces the dependency on centralized servers, mitigating attack impact
B) It removes security controls
C) It allows attackers direct access to devices
D) It weakens network segmentation

Answer: A) It reduces the dependency on centralized servers, mitigating attack impact
Explanation: Edge computing processes data closer to IoT devices, reducing DDoS impact and network congestion.


196. Why should IoT devices enforce automatic session timeouts?

A) To reduce the risk of session hijacking and unauthorized access
B) To disable authentication
C) To allow attackers prolonged access
D) To expose device credentials

Answer: A) To reduce the risk of session hijacking and unauthorized access
Explanation: Automatic session timeouts prevent prolonged unauthorized access, reducing the risk of MITM and hijacking attacks.


197. How does implementing device identity management improve IoT security?

A) It ensures each IoT device has a unique, verifiable identity to prevent impersonation
B) It disables encryption to allow faster communication
C) It allows attackers to access devices without authentication
D) It weakens security by using shared device credentials

Answer: A) It ensures each IoT device has a unique, verifiable identity to prevent impersonation
Explanation: Device identity management assigns unique cryptographic identities to IoT devices, preventing MITM attacks and unauthorized access.


198. Why is it important to restrict IoT devices from using open Wi-Fi networks?

A) Open Wi-Fi networks increase the risk of MITM attacks and data interception
B) Open Wi-Fi improves encryption security
C) Open Wi-Fi prevents unauthorized access
D) Open Wi-Fi networks automatically protect IoT devices

Answer: A) Open Wi-Fi networks increase the risk of MITM attacks and data interception
Explanation: Attackers can intercept unencrypted data on open Wi-Fi networks, making IoT devices vulnerable to MITM attacks.


199. What is a primary function of network behavior analysis in IoT security?

A) To detect anomalies and identify potential cyber threats in real-time
B) To allow attackers to freely move within the network
C) To disable encryption for faster performance
D) To remove authentication requirements

Answer: A) To detect anomalies and identify potential cyber threats in real-time
Explanation: Network behavior analysis monitors IoT device traffic, detecting suspicious activity indicative of MITM or DDoS attacks.


200. How does implementing IoT device isolation improve network security?

A) By ensuring compromised devices cannot affect the rest of the network
B) By exposing encryption keys
C) By allowing all IoT devices unrestricted communication
D) By disabling firewall protection

Answer: A) By ensuring compromised devices cannot affect the rest of the network
Explanation: IoT device isolation limits the impact of an infected or compromised device, reducing the spread of DDoS attacks and malware infections.


201. What is the role of a Public Key Infrastructure (PKI) in securing IoT devices?

A) It enables secure authentication using digital certificates
B) It weakens encryption algorithms
C) It exposes device credentials to attackers
D) It removes the need for authentication

Answer: A) It enables secure authentication using digital certificates
Explanation: PKI ensures IoT devices authenticate securely using cryptographic certificates, preventing MITM attacks.


202. Why should IoT devices avoid using default SNMP community strings?

A) Default SNMP credentials can be exploited for unauthorized network access
B) Default SNMP settings prevent MITM attacks
C) Default SNMP settings improve security
D) Default SNMP settings automatically encrypt data

Answer: A) Default SNMP credentials can be exploited for unauthorized network access
Explanation: SNMP default community strings (e.g., “public”) are widely known, allowing attackers to manipulate IoT devices and intercept data.


203. How does implementing an AI-driven SIEM solution improve IoT security?

A) It automates real-time detection and response to security threats
B) It disables encryption protocols
C) It removes authentication mechanisms
D) It prevents devices from communicating

Answer: A) It automates real-time detection and response to security threats
Explanation: AI-driven SIEM continuously analyzes IoT security logs, detecting and mitigating MITM, DDoS, and unauthorized access attacks.


204. Why is disabling unused IoT communication protocols a good security practice?

A) It reduces attack vectors by preventing exploitation of unnecessary services
B) It allows attackers to exploit weak network configurations
C) It improves attack surface visibility
D) It enables unrestricted data transmission

Answer: A) It reduces attack vectors by preventing exploitation of unnecessary services
Explanation: Disabling unused protocols prevents attackers from exploiting vulnerabilities, reducing MITM and DDoS risks.


205. What is the benefit of using blockchain technology for IoT security?

A) It provides decentralized, tamper-resistant device authentication and data integrity
B) It weakens device encryption
C) It allows attackers to modify IoT logs
D) It removes security policies

Answer: A) It provides decentralized, tamper-resistant device authentication and data integrity
Explanation: Blockchain ensures data integrity and secure authentication for IoT devices, preventing MITM attacks and unauthorized tampering.