Module 19 - Static Hosts - Q&A Flashcards

1
Q

Which of the following would be considered static hosts? (Choose all that apply.)
A. HVAC systems controlled by remote access over an IP network
B. Game consoles with Internet access
C. A user workstation in an office
D. A pumping mechanism in a sewage treatment plant that uses an embedded Linux operating system

A

A, B, D. User workstations in an office would not be considered as static or specialized hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following has an operating system installed as firmware on a hardware chip?
A. Workstation
B. Embedded device
C. Server
D. Cluster
A

B. An embedded device has an operating system installed as firmware on a hardware chip.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

All of the following are characteristics of SCADA devices, except:
A. Used to control mechanical and production devices
B. Often found in utilities and manufacturing facilities
C. Fully fledged, multifunctional computing devices
D. Controlled remotely via network protocols

A

C. SCADA devices are usually single-purpose, limited functionality devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following device platforms is considered open source and less restrictive in terms of development requirements?
A. Android
B. Blackberry
C. iOS
D. Windows
A

A. Android-based devices are considered open source and less restrictive in terms of development requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following are common security concerns associated with Internet-connected gaming devices? (Choose two.)
A. Denial-of-service attacks against the device
B. Child safety
C. Attacks against user authentication
D. Unauthorized access to personal information stored on the device

A

B,
D. Both child safety and unauthorized access to personal or financial information stored on gaming consoles are of particular concern to parents and security professionals alike.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following terms describes the use of several different manufacturers and models of web proxy devices in a layered security architecture?
A. Control compensation
B. Control redundancy
C. Control diversity
D. Defense-in-depth
A

C. Control diversity is a concept that describes the use of several different manufacturers and models of web proxy devices in layered security architectures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
All of the following would be considered ways to separate sensitive static hosts from others on a network, except:
A. Virtual LANs
B. Physically separated network segments
C. Different IP address ranges
D. Separate collision domains
A

D. Separate collision domains do not give any special type of separation or segmentation of sensitive static hosts from others on the network; devices separated only by collision domain are still usually on the same logical and physical network segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following does an application firewall focus on for traffic filtering?
A. Traffic content
B. Protocol and port
C. Source or destination IP address
D. Domain name
A

A. An application firewall focuses on traffic content for filtering, rather than on traffic characteristics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following hardware characteristics for static hosts is important to control in an enterprise environment, due to interoperability and security issues?
A. Encryption strength
B. Software version
C. Firmware version
D. Authentication method
A

C. Firmware version is important to control in an enterprise environment, due to interoperability and security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following refers to a programming or software-based interface used to manage connections and traffic access to and from a host?
A. Firewall
B. Wrapper
C. Firmware
D. Embedded OS
A

B. A wrapper is a programming or software-based interface used to manage connections and traffic access to and from a host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly