11.4 Services Provided by Network Devices, 11.4.14 Practice Questions
Which of the following are IoT systems that work together to make communication between two endpoints possible?
1. Gateway system 2. Data storage
What are two major concerns regarding IoT devices?
1. Hacking 2. Privacy
Match each smart device with its description.
1. Thermostat --Learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real time, and adjusts itself depending on ambient conditions. 2. Switch --Allows you to control hardwired lights, ceiling fans, fireplaces, small appliances, and garbage disposals. 3. Bulb --Can change colors, track motion, stream audio over Bluetooth, and double as a connected camera, but it's only smart when turned on. 4. Plug --Easy solution for making small appliances such as lamps, coffee makers, and toasters smart. 5. Security camera --Uses an RF transmitter. May include such features as motion detection, scheduled recording, remote viewing, and automatic cloud storage. 6. Door lock --Uses a wireless protocol and a cryptographic key to execute the authorization process. It can also monitor access and send alerts related to a device's status. Uses voice recognition software and activates through a Wake Word or Hot Word. 7. Speaker/digital assistant --Uses a wireless protocol and a cryptographic key to execute the authorization process. It can also monitor access and send alerts related to a device's status.
What are the two mesh protocols that are used most often with IoT devices?
1. Z-Wave 2. Zigbee
Your employer wants a system that guarantees that all components will work together with minimal configuration and setup. Time is of the essence in getting this new system ready. Which of the following would BEST meet your emoloyer's needs?
DCS
You are the network administrator for a small consulting firm. The firm has recently rolled out a new intranet site, and you are responsible for configuring the DNS. You are able to connect to the intranet site by using the IP address, but you cannot connect by using the hostname. Which of the following do you need to configure to access the site with the hostname?
Forward lookup zone
Which of the following UTM appliances monitors all network traffic and blocks malicious traffic while notifying the network security team?
IPS
Which of the following DHCP scope options will assign a static IP configuration to a device using the device's MAC address?
Reservation
You are working as a junior security technician for a consulting firm. One of your clients is upgrading their network infrastructure. The client needs a new firewall and intrusion prevention system installed. They also want to be able to block employees from visiting certain types of websites. The client also needs a VPN. Which of the following internet appliances should you install?
Unified Threat Management
Which of the following is an inherent vulnerability of embedded devices?
Unknown environments