Site icon T4Tutorials.com

Cybersecurity in IoT-enabled grids – MCQs – EE

1. What is the primary goal of cybersecurity in IoT-enabled smart grids?

(A) To ensure reliable, secure, and uninterrupted power operations


(B) To increase electricity consumption


(C) To reduce communication channels


(D) To disable remote access



2. Which of the following is a major cybersecurity threat to IoT-based grids?

(A) Denial of Service (DoS) attack


(B) Power factor correction


(C) Voltage stabilization


(D) Harmonic filtering



3. The main purpose of encryption in IoT smart grids is:

(A) To protect data confidentiality during transmission


(B) To reduce data storage


(C) To increase power usage


(D) To change communication protocols



4. Which protocol is commonly used for secure communication in IoT devices?

(A) HTTPS


(B) FTP


(C) Telnet


(D) SMTP



5. The CIA triad in cybersecurity stands for:

(A) Confidentiality, Integrity, Availability


(B) Control, Information, Access


(C) Cyber, Internet, Automation


(D) Confidentiality, Intelligence, Authentication



6. Which layer of IoT architecture is most vulnerable to physical attacks?

(A) Perception layer


(B) Network layer


(C) Application layer


(D) Cloud layer



7. The Man-in-the-Middle (MITM) attack affects which cybersecurity principle the most?

(A) Integrity


(B) Confidentiality


(C) Availability


(D) Redundancy



8. Which of the following best describes a botnet?

(A) A network of compromised IoT devices controlled remotely


(B) A wireless sensor network


(C) A secure VPN


(D) A power grid monitoring system



9. The process of identifying vulnerabilities and assessing risks in a system is called:

(A) Risk assessment


(B) Encryption


(C) Data hiding


(D) Authentication



10. Authentication ensures:

(A) The identity of communicating devices is verified


(B) Data is always encrypted


(C) Continuous data transmission


(D) Reduced voltage drops



11. Which cryptographic method is commonly used for secure IoT communication?

(A) AES (Advanced Encryption Standard)


(B) AM modulation


(C) PWM


(D) PID control



12. Public Key Infrastructure (PKI) is used to manage:

(A) Digital certificates and encryption keys


(B) Network routers


(C) Sensor calibration


(D) Circuit protection



13. Which of the following is an insider threat in IoT-enabled grids?

(A) Unauthorized access by an employee


(B) Power surge


(C) Sensor malfunction


(D) Hardware damage



14. In IoT grids, firmware updates should be:

(A) Signed and verified before installation


(B) Installed automatically without checks


(C) Ignored for old devices


(D) Done manually only



15. Which cybersecurity attack floods a system with excessive requests?

(A) DDoS (Distributed Denial of Service)


(B) Malware infection


(C) Eavesdropping


(D) Spoofing



16. Data integrity in smart grids ensures that:

(A) Information is not altered during transmission


(B) Data remains encrypted


(C) Power remains stable


(D) Only cloud storage is used



17. The network layer in IoT grids is mainly responsible for:

(A) Data transmission and routing


(B) Data sensing


(C) User interface


(D) Local power generation



18. Which type of malware encrypts user data and demands payment?

(A) Ransomware


(B) Spyware


(C) Worm


(D) Trojan



19. In smart grids, intrusion detection systems (IDS) are used for:

(A) Monitoring and detecting unauthorized activities


(B) Power line communication


(C) Frequency stabilization


(D) Demand forecasting



20. A replay attack involves:

(A) Reusing previously captured valid data packets


(B) Blocking data flow completely


(C) Encrypting all transmissions


(D) Shutting down IoT nodes



21. Which technology enhances security in distributed IoT grids through immutable ledgers?

(A) Blockchain


(B) Relay logic


(C) RF communication


(D) PLC control



22. The TLS (Transport Layer Security) protocol provides:

(A) Secure communication over computer networks


(B) High voltage control


(C) Frequency synchronization


(D) Data compression



23. The main challenge in IoT cybersecurity is:

(A) Limited computational resources of devices


(B) Excess storage


(C) Strong network boundaries


(D) High device cost



24. The application layer in IoT grid security is concerned with:

(A) User access control and service authentication


(B) Power distribution


(C) Voltage monitoring


(D) Data sensing



25. Which of the following helps secure communication between IoT sensors and the cloud?

(A) VPN tunneling


(B) Open Wi-Fi


(C) Plain text transfer


(D) Unverified protocols



26. Spoofing in IoT networks refers to:

(A) Impersonation of legitimate devices or users


(B) Encrypting transmitted data


(C) Secure data routing


(D) Data storage compression



27. Which of the following tools can help monitor cyber threats in IoT-enabled grids?

(A) SIEM (Security Information and Event Management)


(B) Multimeter


(C) Oscilloscope


(D) Load tester



28. Access control in cybersecurity ensures that:

(A) Only authorized users can access system resources


(B) Every user gets full control


(C) Data remains unencrypted


(D) Devices communicate freely without checks



29. A zero-trust security model assumes that:

(A) No device or user should be trusted by default


(B) All internal users are safe


(C) Firewalls eliminate all risks


(D) Cloud is inherently secure



30. The best way to enhance cybersecurity in IoT-enabled grids is:

(A) Implementing layered security, encryption, and continuous monitoring


(B) Relying on hardware isolation only


(C) Avoiding updates


(D) Disconnecting devices from the network



Exit mobile version