7.7.4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Smart devices are attractive targets for cyber criminals because they typically have minimal security and are not protected with anti-malware software. This makes it easier to exploit these types of devices and perpetrate attacks. Many smart devices can be utilized to conduct a single coordinated attack. What is this type of attack usually called?

A highly distributed attack

Why do attackers prefer to conduct distributed network attacks in static environments? (Select two.)

Devices are, typically, more difficult to monitor than traditional network devices. Devices tend to employ much weaker security than traditional network devices.

You manage information systems for a large co-location data center. Networked environmental controls are used to embedded smart technology that allows them to be managed manage the temperature within the data center. These controls use over an internet connection using a mobile device app. You are concerned about the security of these devices, What can you do to increase their security posture? (Select two.)

Install the latest firmware updates from the device manufacturer. Verify that your network's existing security infrastructure is working properly.

connecting to your network. You notice a growing number of devices, such as environmental control systems and wearable devices, are These devices, known as smart devices, are sending and receiving data via wireless network connections. Which of the following labels applies to this growing ecosystem of smart devices?

Internet of things

You manage the information systems for a large manufacturing firm. Supervisory control and data acquisition (SCADA) devices are used on the manufacturing organization's automated factory equipment. The SCADA devices use be managed using a mobile device app over an internet connection. floor to manage your embedded smart technology, allowing them to You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)

Verify that your network's existing security infrastructure is working properly. Install the latest firmware updates from the device manufacturer.


Ensembles d'études connexes

EF3 Inter - 4A - can could, be able to

View Set

MTA Introduction to Programming Using Python Test 1 Training

View Set

Prep U Chapter 24: Nursing Care of the Child with an Integumentary Disorder

View Set

flow of fluid from the glomerulus to the external urethral orifice

View Set

PSIO 201: quiz 2A and 2B questions

View Set

All RHIA and Mock Domains (FAMU)

View Set