1. What is the primary goal of cybersecurity in IoT-enabled smart grids?
(A) To ensure reliable, secure, and uninterrupted power operations
(B) To increase electricity consumption
(C) To reduce communication channels
(D) To disable remote access
2. Which of the following is a major cybersecurity threat to IoT-based grids?
(A) Denial of Service (DoS) attack
(B) Power factor correction
(C) Voltage stabilization
(D) Harmonic filtering
3. The main purpose of encryption in IoT smart grids is:
(A) To protect data confidentiality during transmission
(B) To reduce data storage
(C) To increase power usage
(D) To change communication protocols
4. Which protocol is commonly used for secure communication in IoT devices?
(A) HTTPS
(B) FTP
(C) Telnet
(D) SMTP
5. The CIA triad in cybersecurity stands for:
(A) Confidentiality, Integrity, Availability
(B) Control, Information, Access
(C) Cyber, Internet, Automation
(D) Confidentiality, Intelligence, Authentication
6. Which layer of IoT architecture is most vulnerable to physical attacks?
(A) Perception layer
(B) Network layer
(C) Application layer
(D) Cloud layer
7. The Man-in-the-Middle (MITM) attack affects which cybersecurity principle the most?
(A) Integrity
(B) Confidentiality
(C) Availability
(D) Redundancy
8. Which of the following best describes a botnet?
(A) A network of compromised IoT devices controlled remotely
(B) A wireless sensor network
(C) A secure VPN
(D) A power grid monitoring system
9. The process of identifying vulnerabilities and assessing risks in a system is called:
(A) Risk assessment
(B) Encryption
(C) Data hiding
(D) Authentication
10. Authentication ensures:
(A) The identity of communicating devices is verified
(B) Data is always encrypted
(C) Continuous data transmission
(D) Reduced voltage drops
11. Which cryptographic method is commonly used for secure IoT communication?
(A) AES (Advanced Encryption Standard)
(B) AM modulation
(C) PWM
(D) PID control
12. Public Key Infrastructure (PKI) is used to manage:
(A) Digital certificates and encryption keys
(B) Network routers
(C) Sensor calibration
(D) Circuit protection
13. Which of the following is an insider threat in IoT-enabled grids?
(A) Unauthorized access by an employee
(B) Power surge
(C) Sensor malfunction
(D) Hardware damage
14. In IoT grids, firmware updates should be:
(A) Signed and verified before installation
(B) Installed automatically without checks
(C) Ignored for old devices
(D) Done manually only
15. Which cybersecurity attack floods a system with excessive requests?
(A) DDoS (Distributed Denial of Service)
(B) Malware infection
(C) Eavesdropping
(D) Spoofing
16. Data integrity in smart grids ensures that:
(A) Information is not altered during transmission
(B) Data remains encrypted
(C) Power remains stable
(D) Only cloud storage is used
17. The network layer in IoT grids is mainly responsible for:
(A) Data transmission and routing
(B) Data sensing
(C) User interface
(D) Local power generation
18. Which type of malware encrypts user data and demands payment?
(A) Ransomware
(B) Spyware
(C) Worm
(D) Trojan
19. In smart grids, intrusion detection systems (IDS) are used for:
(A) Monitoring and detecting unauthorized activities
(B) Power line communication
(C) Frequency stabilization
(D) Demand forecasting
20. A replay attack involves:
(A) Reusing previously captured valid data packets
(B) Blocking data flow completely
(C) Encrypting all transmissions
(D) Shutting down IoT nodes
21. Which technology enhances security in distributed IoT grids through immutable ledgers?
(A) Blockchain
(B) Relay logic
(C) RF communication
(D) PLC control
22. The TLS (Transport Layer Security) protocol provides:
(A) Secure communication over computer networks
(B) High voltage control
(C) Frequency synchronization
(D) Data compression
23. The main challenge in IoT cybersecurity is:
(A) Limited computational resources of devices
(B) Excess storage
(C) Strong network boundaries
(D) High device cost
24. The application layer in IoT grid security is concerned with:
(A) User access control and service authentication
(B) Power distribution
(C) Voltage monitoring
(D) Data sensing
25. Which of the following helps secure communication between IoT sensors and the cloud?
(A) VPN tunneling
(B) Open Wi-Fi
(C) Plain text transfer
(D) Unverified protocols
26. Spoofing in IoT networks refers to:
(A) Impersonation of legitimate devices or users
(B) Encrypting transmitted data
(C) Secure data routing
(D) Data storage compression
27. Which of the following tools can help monitor cyber threats in IoT-enabled grids?
(A) SIEM (Security Information and Event Management)
(B) Multimeter
(C) Oscilloscope
(D) Load tester
28. Access control in cybersecurity ensures that:
(A) Only authorized users can access system resources
(B) Every user gets full control
(C) Data remains unencrypted
(D) Devices communicate freely without checks
29. A zero-trust security model assumes that:
(A) No device or user should be trusted by default
(B) All internal users are safe
(C) Firewalls eliminate all risks
(D) Cloud is inherently secure
30. The best way to enhance cybersecurity in IoT-enabled grids is:
(A) Implementing layered security, encryption, and continuous monitoring
(B) Relying on hardware isolation only
(C) Avoiding updates
(D) Disconnecting devices from the network