practice questions notes Flashcards

1
Q

_____ matches the hostname to the IP address

A

The forward lookup zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ matches the IP address to the hostname

A

A reverse lookup zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Dynamic DNS (DDNS)

A

enables clients or the DHCP server to update records in the zone database automatically (whenever an IP address lease is created or renewed).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The CNAME record

A

provides alternate names (or aliases) to hosts that already have a host record. Using a single A record with multiple CNAME records means that when the IP address changes, only the A record needs to be modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____ are assigned by the DHCP server using the device’s MAC address.

A

Reservations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Whenever the device with the specified MAC address connects to the network, the DHCP server assigns the reserved static IP configuration to that device. (true/false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Reservations are static IP addresses that are not dynamically assigned by the DHCP server. (true/false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The IP range

A

defines the range of IP addresses that the DHCP server can assign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The default gateway

A

defines where data packets that leave the network should go

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_____ are IP addresses that the DHCP server will not assign.

A

Exclusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____ monitors all network traffic, looking for anything out of the ordinary

A

The intrusion prevention system (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When malicious or suspicious packets are detected, the IPS blocks the packets and notifies the network security team so further action can be taken. (true/false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_____ is responsible for monitoring and controlling all incoming and outgoing traffic.

A

The firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The firewall controls the flow of data based on rules that have been configured by the network administrator. Most firewalls are configured to detect the type of traffic, the source and destination addresses, and ports. (true/false)

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Many UTM appliances use _____ software to detect and prevent malware from infecting the network

A

anti-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

_____ maps internal private IP addresses to a public IP address.

A

Network Address Translation (NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Unified Threat Management (UTM) appliance…

A

combines multiple functions into one single device, including the firewall, IPS, content filtering, VPN support, and much more.

18
Q

_____ are two majors concerns for IoT users

A

Hackers and privacy

19
Q

Because IoT devices are closely connected, all a hacker has to do is exploit one vulnerability to manipulate all the data, rendering it unusable. Additionally, companies that make and distribute consumer IoT devices could use those devices to obtain and sell users’ personal data. (true/false)

A

true

20
Q

_____ are two radio protocols that many IoT devices work with because they are designed for low-data rate, low-power applications. These protocols link all IoT devices to form a mesh network.

A

Zigbee and Z-Wave

21
Q

Zensys

A

is the developer of the Z-Wave wireless mesh networking technology.

22
Q

_____ is a fictitious alien species that inhabits the Milky Way.

A

Zerg

23
Q

Zbot

A

is a Trojan virus that targets Windows computers to extract sensitive financial information.

24
Q

_____ learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real time, and adjusts itself depending on ambient conditions.

A

A smart thermostat

25
Q

smart switch

A

allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals.

26
Q

_____ can change colors, track motion, stream audio over Bluetooth, and double as a connected camera, but it’s only smart when turned on.

A

A smart bulb

27
Q

A smart plug

A

is an easy solution for making appliances such as lamps, coffee makers, and toasters smart.

28
Q

_____ uses an RF transmitter and may include such features as motion detection, scheduled recording, remote viewing, and automatic cloud storage.

A

A smart security camera

29
Q

A smart door lock

A

uses a wireless protocol and a cryptographic key to execute the authorization process. A smart door can also monitor access and send alerts related to a device’s status.

30
Q

_____ uses voice recognition software and activates through a Wake Word or Hot Word.

A

A smart speaker/digital assistant

31
Q

IoT systems that work together to make communication between two endpoints possible?

A

-Data storage
-Gateway system

32
Q

Two of the four IoT systems that work together for endpoint communication include the gateway system and data storage. (true/false)

A

true

33
Q

_____ connects an IoT device to the cloud

A

gateway system

34
Q

_____ is the system in the cloud that stores, processes, and analyzes the data

A

data storage

35
Q

The access gateway is the layer of the IoT architecture that compresses the gathered data to an optimal size for analysis. (true/false)

A

true

36
Q

_____ is another layer of the IoT architecture that includes cloud processes, such as device information discovery and access control.

A

Middleware

37
Q

Wi-Fi is one of the IoT’s communication protocols. (true/false)

A

true

38
Q

distributed control system (DCS)

A

is a customized, all-in-one package that contains the needed PLCs, SCADA controller, and HMI.

39
Q

_____ is a specialized controller that can be programmed to perform specific tasks.

A

programmable logic controller (plc)

40
Q

Supervisory control and data acquisition (SCADA)

A

controllers are used to monitor and control PLC systems. SCADA controllers adjust the system based on the data acquired from sensors.

41
Q

_____ can be either a touchscreen control panel or software running on a typical computer system. _____ allows the operator to make configuration changes in the system.

A

The human-machine interface (HMI)

42
Q

Embedded devices are sealed systems, which means that they are typically unknown environments. (true/false)

A

true
explanation:
This means that the security administrator will not always know which hardware is in the device.