1. Right Answer: B
Explanation: Middleware Layer is for device and information management.
2. Right Answer: A
Explanation: Device-to-Cloud Model is another model of IoT device communication in which IoT devices are directly communicating with the application server.
3. Right Answer: B
Explanation: Rolling Code or Code Hopping is another technique to exploit. In this technique, attackers capture the code, sequence or signal coming from transmitter devices, simultaneously blocking the receiver to receive the signal. This captured code will later be used to gain unauthorized access.
4. Right Answer: B
Explanation: The message is the digested cryptographic hashing technique that is used to ensure the integrity of a message.
5. Right Answer: B
Explanation: Disk Encryption refers to the encryption of disk to secure files and directories by converting into an encrypted format. Disk encryption encrypts every bit on disk to prevent unauthorized access to data storage.