1/17
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Which category of IOT devices help manage public resources efficiently
Smart city devices
Which of the following is NOT one of the risks of inadequate physical security
malware exploits
What term describes a secure buffer zone between an organizations internal network and the external untrusted internet
perimeter network
which IOT networking standard supports bandwidths up to 1 Mbps for more data intensive IoT applications
LTE machine type communication (LTE-M)
Which of the following is NOT a mitigation technique to combat tailgating
perimeter fencing
in a screened subnet which firewall filters communication between hosts in the perimeter and hosts on the LAn
internal firewall
which of the following about an IPs is true
prioritizes prevention over alerting
in which of the following zones is access tightly controlled
private security network
what is the primary benefit of CCTV
expands the area visible to security guards
what is a major concern regarding IoT devices
privacy
which of the following statements is true regarding network zones
a zone is an area where all hosts have the same level of trust
which of the following is considered part of a smart home
thermostat
in which of the following zones is separated from the internal networks to prevent direct attacks
public server network
an IDS is configured with _____ patterns each pattern represents a known type of malicious activity
signature
what is the main drawback of anomaly based detection
it generates a large amount of false positives
which of the following controls is an example of a physical access control method
locks on doors
which category of IOT devices are often controlled through mobile devices
consumer devices
which of the following is not a method used by an ISP to gain protection against an attack
apply a permanent filter on the firewall to block the attackers IP address