Inspirational journeys

Follow the stories of academics and their research expeditions

Comptia Pentest+ 2023 Questions and answer - Part 43

Mary Smith

Sat, 01 Nov 2025

Comptia Pentest+ 2023 Questions and answer - Part 43

1. Which layer in IoT architecture is responsible for device and information management?

A) Middleware Layer
B) Application Layer
C) Access Gateway Layer
D) Edge Technology Layer



2. An IoT device directly communicating with the application server is called _______________.

A) Device-to-Device Model
B) Device-to-Cloud Model
C) Device-to-Gateway Model
D) Back-End Data Sharing Model



3. An eavesdropper records the transmission and replays it at a later time to cause the receiver to 'unlock', this attack is known as _____________________.

A) Rolling Code Attack
B) RF Attack
C) Blueborne attack
D) Sybil Attack



4. The message digest is used to ensure ___________.

A) Confidentiality
B) Integrity
C) Availability
D) Authentication



5. The most secure way to mitigate information theft from a laptop of an organization left in a public place is _______________________.

A) Use a strong login password
B) Hard Drive Encryption
C) Set a BIOS password
D) Back-up



1. Right Answer: B
Explanation: Middleware Layer is for device and information management.

2. Right Answer: A
Explanation: Device-to-Cloud Model is another model of IoT device communication in which IoT devices are directly communicating with the application server.

3. Right Answer: B
Explanation: Rolling Code or Code Hopping is another technique to exploit. In this technique, attackers capture the code, sequence or signal coming from transmitter devices, simultaneously blocking the receiver to receive the signal. This captured code will later be used to gain unauthorized access.

4. Right Answer: B
Explanation: The message is the digested cryptographic hashing technique that is used to ensure the integrity of a message.

5. Right Answer: B
Explanation: Disk Encryption refers to the encryption of disk to secure files and directories by converting into an encrypted format. Disk encryption encrypts every bit on disk to prevent unauthorized access to data storage.

0 Comments

Leave a comment