9.96

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is an open-source hardware and software company that designs and manufactures single-board microcontrollers as well as kits to build digital devices?

Arduino

Why do attackers prefer to conduct distributed network attacks in static environments? (Select two.)

Devices tend to employ much weaker security than traditional network devices.,Devices are typically more difficult to monitor than traditional network devices.

Which Amazon device can be used to control smart devices (such as lights) throughout a home using voice commands?

Echo

You manage the information systems for a large manufacturing firm. Supervisory control and data acquisition (SCADA) devices are used on the manufacturing floor to manage your organization's automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)

Install the latest firmware updates from the device manufacturer.,Verify that your network's existing security infrastructure is working properly.

You notice that a growing number of devices, such as environmental control systems and wearable devices, are connecting to your network. These devices, known as smart devices, are sending and receiving data via wireless network connections. Which of the following labels applies to this growing ecosystem of smart devices?

Internet of Things (IoT)

Which of the following serves real-time applications without buffer delays?

RTOS

Which of the following devices are special computer systems that gather, analyze, and manage automated factory equipment?

SCADA

Which of the following do Raspberry Pi systems make use of?

SoC

You manage information systems for a large co-location data center. Networked environmental controls are used to manage the temperature within the data center. These controls use embedded smart technology that allows them to be managed over an internet connection using a mobile device app. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)

Verify that your network's existing security infrastructure is working properly.,Install the latest firmware updates from the device manufacturer.

Which of the following lets you make phone calls over a packet-switched network?

VoIP


Conjuntos de estudio relacionados

chapter 11 integumentary system lab

View Set

Psychology (PSY 200) Chapter 4-7 Test Study Guide

View Set

NU372 HESI Prep: Immunologic system and infectious disease

View Set

Chapter 16 Weather, Erosion, and Mass Wasting: Interactions Between the Climate and Plate Tectonic Systems

View Set

BM Excel 2019 L2 C3 Concepts Exam

View Set