practice questions notes Flashcards
_____ matches the hostname to the IP address
The forward lookup zone
_____ matches the IP address to the hostname
A reverse lookup zone
Dynamic DNS (DDNS)
enables clients or the DHCP server to update records in the zone database automatically (whenever an IP address lease is created or renewed).
The CNAME record
provides alternate names (or aliases) to hosts that already have a host record. Using a single A record with multiple CNAME records means that when the IP address changes, only the A record needs to be modified
_____ are assigned by the DHCP server using the device’s MAC address.
Reservations
Whenever the device with the specified MAC address connects to the network, the DHCP server assigns the reserved static IP configuration to that device. (true/false)
true
Reservations are static IP addresses that are not dynamically assigned by the DHCP server. (true/false)
true
The IP range
defines the range of IP addresses that the DHCP server can assign
The default gateway
defines where data packets that leave the network should go
_____ are IP addresses that the DHCP server will not assign.
Exclusions
_____ monitors all network traffic, looking for anything out of the ordinary
The intrusion prevention system (IPS)
When malicious or suspicious packets are detected, the IPS blocks the packets and notifies the network security team so further action can be taken. (true/false)
true
_____ is responsible for monitoring and controlling all incoming and outgoing traffic.
The firewall
The firewall controls the flow of data based on rules that have been configured by the network administrator. Most firewalls are configured to detect the type of traffic, the source and destination addresses, and ports. (true/false)
true
Many UTM appliances use _____ software to detect and prevent malware from infecting the network
anti-malware
_____ maps internal private IP addresses to a public IP address.
Network Address Translation (NAT
Unified Threat Management (UTM) appliance…
combines multiple functions into one single device, including the firewall, IPS, content filtering, VPN support, and much more.
_____ are two majors concerns for IoT users
Hackers and privacy
Because IoT devices are closely connected, all a hacker has to do is exploit one vulnerability to manipulate all the data, rendering it unusable. Additionally, companies that make and distribute consumer IoT devices could use those devices to obtain and sell users’ personal data. (true/false)
true
_____ are two radio protocols that many IoT devices work with because they are designed for low-data rate, low-power applications. These protocols link all IoT devices to form a mesh network.
Zigbee and Z-Wave
Zensys
is the developer of the Z-Wave wireless mesh networking technology.
_____ is a fictitious alien species that inhabits the Milky Way.
Zerg
Zbot
is a Trojan virus that targets Windows computers to extract sensitive financial information.
_____ learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real time, and adjusts itself depending on ambient conditions.
A smart thermostat
smart switch
allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals.
_____ can change colors, track motion, stream audio over Bluetooth, and double as a connected camera, but it’s only smart when turned on.
A smart bulb
A smart plug
is an easy solution for making appliances such as lamps, coffee makers, and toasters smart.
_____ uses an RF transmitter and may include such features as motion detection, scheduled recording, remote viewing, and automatic cloud storage.
A smart security camera
A smart door lock
uses a wireless protocol and a cryptographic key to execute the authorization process. A smart door can also monitor access and send alerts related to a device’s status.
_____ uses voice recognition software and activates through a Wake Word or Hot Word.
A smart speaker/digital assistant
IoT systems that work together to make communication between two endpoints possible?
-Data storage
-Gateway system
Two of the four IoT systems that work together for endpoint communication include the gateway system and data storage. (true/false)
true
_____ connects an IoT device to the cloud
gateway system
_____ is the system in the cloud that stores, processes, and analyzes the data
data storage
The access gateway is the layer of the IoT architecture that compresses the gathered data to an optimal size for analysis. (true/false)
true
_____ is another layer of the IoT architecture that includes cloud processes, such as device information discovery and access control.
Middleware
Wi-Fi is one of the IoT’s communication protocols. (true/false)
true
distributed control system (DCS)
is a customized, all-in-one package that contains the needed PLCs, SCADA controller, and HMI.
_____ is a specialized controller that can be programmed to perform specific tasks.
programmable logic controller (plc)
Supervisory control and data acquisition (SCADA)
controllers are used to monitor and control PLC systems. SCADA controllers adjust the system based on the data acquired from sensors.
_____ can be either a touchscreen control panel or software running on a typical computer system. _____ allows the operator to make configuration changes in the system.
The human-machine interface (HMI)
Embedded devices are sealed systems, which means that they are typically unknown environments. (true/false)
true
explanation:
This means that the security administrator will not always know which hardware is in the device.