Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Ask a Question
Top 100+ questions in Internet of Things IoT
Home
Questions
Internet of Things IoT
0
votes
Q: What is Pulse Width Modulation?
asked
Dec 20, 2021
in
Internet of Things IoT
by
Robindeniel
pulse-width-modulation
0
votes
Q: What are the most common IoT applications?
asked
Dec 20, 2021
in
Internet of Things IoT
by
Robindeniel
iot-applications
0
votes
Q: What is Bluegiga APX4 protocol?
asked
Dec 20, 2021
in
Internet of Things IoT
by
Robindeniel
apx4-protocol
0
votes
Q: What are the advantages of IoT?
asked
Dec 20, 2021
in
Internet of Things IoT
by
Robindeniel
iot-advantages
0
votes
Q: List mostly used sensors types in IoT
asked
Dec 20, 2021
in
Internet of Things IoT
by
Robindeniel
iot-sensors
0
votes
Q: What are the disadvantages of IoT?
asked
Dec 20, 2021
in
Internet of Things IoT
by
Robindeniel
iot-disadvantages
0
votes
Q: List layers of IoT protocol stack
asked
Dec 20, 2021
in
Internet of Things IoT
by
Robindeniel
iot-protocol-stack
0
votes
Q: What is the difference between IoT and IIoT?
asked
Dec 20, 2021
in
Internet of Things IoT
by
Robindeniel
iot
iiot
0
votes
Q: What are the fundamental components of IoT?
asked
Dec 20, 2021
in
Internet of Things IoT
by
Robindeniel
iot-components
0
votes
Q: Explain Raspberry Pi
asked
Dec 20, 2021
in
Internet of Things IoT
by
Robindeniel
raspbery-pi
0
votes
Q: PowerShell command is in ___________________ format. Choose the correct otpion from below list
asked
Jul 27, 2020
in
Internet of Things IoT
by
Hodge
#powersehll
0
votes
Q: Which technique of Threat hunting is considered to be the "least difficult" to hunt?
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#search
0
votes
Q: Which of the following are threat modeling tools?
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-modelling-tools
0
votes
Q: Who described the five levels of hunting maturity model?
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#hunter-david
0
votes
Q: Modifying a data within the system to achieve a malicious goal is known as __________
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#data-tempring
0
votes
Q: Which of the following is not a mitigation technique for the information disclosure type of threat
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-encyption
0
votes
Q: Threat hunting maturity model was defined by
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
0
votes
Q: The process of designing a security specification and then eventually testing that specification is known as
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-modelling
0
votes
Q: ______ is a proactive way of hunting attacks.
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-hunting
0
votes
Q: Threat hunters should mainly focus on which of the following things
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-things
0
votes
Q: Which of the following is used to gather cyber threat intelligence and generate threat analysis report
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-hunt
0
votes
Q: APT stands for ____________.
asked
May 1, 2020
in
Internet of Things IoT
by
SakshiSharma
0
votes
Q: It is very easy for an organization to detect the threats within few days using traditional signature-based technologies.
asked
Apr 28, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-signature
0
votes
Q: Who developed hunting maturity model?
asked
Apr 28, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-technology
0
votes
Q: The threats that become successful in hunting and occurs frequently are automated. This occurs in which level of hunting maturity model?
asked
Apr 28, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-hunting-frequency
0
votes
Q: Which of the following threat hunting platform uses Forensic state analysis (FSA) to discover hidden threats and compromises?
asked
Apr 28, 2020
in
Internet of Things IoT
by
SakshiSharma
#hunting-platform
0
votes
Q: Maltego is an advanced querying tool that uses stateful session data models to complement user behavior analytics.
asked
Apr 28, 2020
in
Internet of Things IoT
by
SakshiSharma
#threa-sessions
0
votes
Q: Malicious executables are transmitted during which stage of cyber Kill chain?
asked
Apr 28, 2020
in
Internet of Things IoT
by
SakshiSharma
#malicious-executables
0
votes
Q: Which of the following is an adaptation of the U.S. military’s kill chain process?
asked
Apr 28, 2020
in
Internet of Things IoT
by
SakshiSharma
#cyber-kill-chain
0
votes
Q: _________ is the first step in discovering adversaries.
asked
Apr 28, 2020
in
Internet of Things IoT
by
SakshiSharma
#threat-adversaries
Page:
1
2
3
4
...
6
next »
...