CYB301-Chapter11

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/17

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

Which category of IOT devices help manage public resources efficiently

Smart city devices

2
New cards

Which of the following is NOT one of the risks of inadequate physical security

malware exploits

3
New cards

What term describes a secure buffer zone between an organizations internal network and the external untrusted internet

perimeter network

4
New cards

which IOT networking standard supports bandwidths up to 1 Mbps for more data intensive IoT applications

LTE machine type communication (LTE-M)

5
New cards

Which of the following is NOT a mitigation technique to combat tailgating 

perimeter fencing 

6
New cards

in a screened subnet which firewall filters communication between hosts in the perimeter and hosts on the LAn

internal firewall

7
New cards

which of the following about an IPs is true

prioritizes prevention over alerting

8
New cards

in which of the following zones is access tightly controlled

private security network

9
New cards

what is the primary benefit of CCTV

expands the area visible to security guards

10
New cards

what is a major concern regarding IoT devices

privacy

11
New cards

which of the following statements is true regarding network zones

a zone is an area where all hosts have the same level of trust

12
New cards

which of the following is considered part of a smart home

thermostat

13
New cards

in which of the following zones is separated from the internal networks to prevent direct attacks

public server network

14
New cards

an IDS is configured with _____ patterns each pattern represents a known type of malicious activity

signature

15
New cards

what is the main drawback of anomaly based detection

it generates a large amount of false positives

16
New cards

which of the following controls is an example of a physical access control method

locks on doors

17
New cards

which category of IOT devices are often controlled through mobile devices

consumer devices

18
New cards

which of the following is not a method used by an ISP to gain protection against an attack

apply a permanent filter on the firewall to block the attackers IP address

Explore top flashcards