and CORRECT Answers
1. IoT Architecture Application
Layers Middleware
Internet
Access Gateway
Edge
2. Middleware Layer Most critical
Responsible for data management, device management, data analysis, data
aggregation, device info discovery, access control
3. Internet Layer Main component in communicating between two end points
Backend data sharing
4. Access Gateway Protocol translation and messaging
Layer
5. Blueborn Attack Exploit bluetooth protocol vulnerabilities
6. Rolling Code At- An attacker jams and sniffs the signal to obtain the code transferred to the
tack vehicle's receiver and uses it to unlock and steal the vehicle.
7. Sybil Attack Attacker uses multiple forged identities to create a strong illusion of traflc con-
gestion, affecting communication between neighboring nodes and networks.
8. Exploit Kits Malicious script used to exploit poorly patched vulnerabilities
9. Android API's Smartwatch
Data, message, node
10. Node API Manages all nodes that can be connected to an Android smartwatch
11. adb pull Logical acquisition on Android smartwatch
12.
, C702 all cyber turtles sets combined
Study online at https://quizlet.com/_dgdfrj
map_data_stor- Amazon Alexa SQLite file
age.db Currently logged in users
13. DataStore.db Amazon Alexa SQLite file
To do lists and shopping lists
ToDos API
14. JTAG Create memory dumps of the device without removing the memory chips
15. Chip-off Removing memory chips and performing physical data acquisition
Destructive method because data may be lost and chip cannot be fixed back
16. Biggest threat to Data loss
mobile devices
17. Hardware Abstrac- Android
tion Layer (HAL) Standard interface for vendors that expose the devices hardware capabilities to
higher level Java API's
18. Libraries Layer Android
Permits a deice to manage various data types
C, C++
19. Application/CPU Architectural Layer
Email, FTP
20. Baseband Part Digital Signal Process (DSP) for voice/data signal transmission
21. USB Debugging Android developer feature
Mode Activated from developer options
Allows android to establish communication with a computer running software
(developer kit)
22.
, C702 all cyber turtles sets combined
Study online at https://quizlet.com/_dgdfrj
USB Restriction iOS
Mode No view to data connections until unlocked
23. Content Providers Apps to share data between each other
24. Resource Manager Manages app resources such as strings, color settings and interface
25. Activity Manager Controls lifecycle of apps running on the device
26. Internal Memory Includes flash memory
27. SIM Card Memory Personal info, address book, messages, service related info
28. Service Provider Obtain data after deletion of call history/text messages
29. Android OS Linux based
30. *#06# International Mobile Equipment Identifier (IMEI)
31. Tethered Jailbreak device cannot be rebooted without a computer and the jailbreak application
because the device no longer runs on a patched kernel once it is turned off
32. Untethered Jail- Allows users to reboot the device any number of times because after every
break reboot the device gets jailbroken automatically
33. Semi-Untethered enables a user to jailbreak a device over multiple boot cycles. The user needs
Jailbreak to connect the device to a computer only to sideload an app that enables the
user to re-jailbreak the iPhone once it has rebooted.
34. Semi-Tethered Jail- it boots into a non-jailbroken state after rebooting the device.
break
35. Paraben's E3 DS - Mobile Forensics Tool
Tool Supports logical and physical data acquisition