practice questions notes Flashcards
_____ matches the hostname to the IP address
The forward lookup zone
_____ matches the IP address to the hostname
A reverse lookup zone
Dynamic DNS (DDNS)
enables clients or the DHCP server to update records in the zone database automatically (whenever an IP address lease is created or renewed).
The CNAME record
provides alternate names (or aliases) to hosts that already have a host record. Using a single A record with multiple CNAME records means that when the IP address changes, only the A record needs to be modified
_____ are assigned by the DHCP server using the device’s MAC address.
Reservations
Whenever the device with the specified MAC address connects to the network, the DHCP server assigns the reserved static IP configuration to that device. (true/false)
true
Reservations are static IP addresses that are not dynamically assigned by the DHCP server. (true/false)
true
The IP range
defines the range of IP addresses that the DHCP server can assign
The default gateway
defines where data packets that leave the network should go
_____ are IP addresses that the DHCP server will not assign.
Exclusions
_____ monitors all network traffic, looking for anything out of the ordinary
The intrusion prevention system (IPS)
When malicious or suspicious packets are detected, the IPS blocks the packets and notifies the network security team so further action can be taken. (true/false)
true
_____ is responsible for monitoring and controlling all incoming and outgoing traffic.
The firewall
The firewall controls the flow of data based on rules that have been configured by the network administrator. Most firewalls are configured to detect the type of traffic, the source and destination addresses, and ports. (true/false)
true
Many UTM appliances use _____ software to detect and prevent malware from infecting the network
anti-malware
_____ maps internal private IP addresses to a public IP address.
Network Address Translation (NAT
Unified Threat Management (UTM) appliance…
combines multiple functions into one single device, including the firewall, IPS, content filtering, VPN support, and much more.
_____ are two majors concerns for IoT users
Hackers and privacy
Because IoT devices are closely connected, all a hacker has to do is exploit one vulnerability to manipulate all the data, rendering it unusable. Additionally, companies that make and distribute consumer IoT devices could use those devices to obtain and sell users’ personal data. (true/false)
true
_____ are two radio protocols that many IoT devices work with because they are designed for low-data rate, low-power applications. These protocols link all IoT devices to form a mesh network.
Zigbee and Z-Wave
Zensys
is the developer of the Z-Wave wireless mesh networking technology.
_____ is a fictitious alien species that inhabits the Milky Way.
Zerg
Zbot
is a Trojan virus that targets Windows computers to extract sensitive financial information.
_____ learns from your habits and schedule, allows you to control the climate in your home remotely, shows you energy consumption in real time, and adjusts itself depending on ambient conditions.
A smart thermostat