What is the benefit of using lockable brackets and drawers within a rack?
To improve the Wi-Fi signal strength
To increase the storage capacity of the rack
To protect individual elements within a rack
To organize cables more efficiently
To protect individual elements within a rack
Why should all IoT devices be included in patch and vulnerability management audits?
answer
To assess their performance efficiency
To identify and mitigate known vulnerabilities
To ensure they are using the latest software versions
To evaluate their environmental impact
To identify and mitigate known vulnerabilities
You want to use CCTV as a preventative security measure.
Which of the following is a requirement for your plan?
Sufficient lighting
Security guards
PTZ camera
Low LUX or infrared camera
Security guards
Which of the following best describes the role of a sniffer in an Intrusion Detection System (IDS)?
It generates signature patterns for detecting malicious activity.
It encrypts network traffic to prevent unauthorized access.
It reads frames from a mirrored port to monitor network traffic.
It serves as a firewall to block malicious traffic.
It reads frames from a mirrored port to monitor network traffic.
Due to an increase in foot traffic from outside groups throughout the building, the organization asks their security office to employ equipment that will allow visual monitoring across the organization.
What equipment would best be suited to manage this request?
Motion Detection
Circuit
Cameras
Asset Tag
Cameras
What is a zone in the context of network security?
A segment of the network that is isolated for performance testing
An area of the network with a specific bandwidth allocation
A physical location within an organization
An area of the network where all hosts have the same level of trust
An area of the network where all hosts have the same level of trust
You are the IT security manager at a medium-sized enterprise. Recently, the company decided to implement smart building technology to improve energy efficiency and security. This technology includes smart thermostats, lighting, and access control systems. You are tasked with ensuring the security of these IoT devices.
Which of the following actions should you prioritize to secure the smart building technology?
Isolate the smart building technology network segments from the corporate data network.
Connect all smart devices directly to the corporate data network for easier management.
Encourage employees to manage the devices to increase engagement and awareness.
Use default configurations for all devices to ensure uniformity and ease of use.
Isolate the smart building technology network segments from the corporate data network.
What advantage does camera-based surveillance have over maintaining separate guards at each gateway or zone?
It is a cheaper means of monitoring.
It is more effective at detecting intrusions.
It requires no power supply.
It can replace all other security measures.
It is a cheaper means of monitoring.
What characterizes a static computing environment?
Limited support for correcting security issues
Frequent hardware and software changes
The ability to install new operating systems
High levels of user customization and data file management
Limited support for correcting security issues
Which security device is typically used to enforce rules between network zones?
Router
Access Point
Switch
Firewall
Firewall
Why are hosts in the perimeter network not fully trusted by the internal network?
Because they are directly connected to the internal network without any controls
Because they do not require any form of security
Because they could potentially be compromised from the Internet
Because they do not communicate with the internal network at all
Because they could potentially be compromised from the Internet
You are concerned about the security of your IoT devices. You have read about vulnerabilities that could allow hackers to gain unauthorized access to your smart home devices, such as your smart locks and security cameras.
Which of the following measures should you prioritize to enhance the security of your IoT devices?
Using proprietary operating systems for your devices
Increasing the battery life of the devices
Regularly updating the firmware of the devices
Connecting all devices to a high-capacity external storage
Regularly updating the firmware of the devices
What is the purpose of installing cages around racks in data centers?
To enhance the visual appeal of the data center
To improve air circulation around the equipment
To restrict access by technicians to their own equipment
To reduce the risk of electrical interference
To restrict access by technicians to their own equipment
Which of the following is a potential vulnerability of integrated peripherals in smart devices?
Increased battery life
Improved device performance
Facilitation of surveillance
Enhanced user experience
Facilitation of surveillance
What is the role of VLANs in network segmentation?
To provide wireless connectivity
To create separate broadcast domains
To enforce security policies at the application layer
To increase the physical security of network devices
To create separate broadcast domains
Which of the following servers should be placed in a perimeter network?
Database servers containing sensitive information
File servers used exclusively by internal employees
Web servers providing public access services
Internal email servers for employee communication
Web servers providing public access services
What is the primary function of an embedded system?
To perform a specific, dedicated function
To serve as a primary computing device for users
To facilitate high-speed internet connectivity
To run multiple applications simultaneously
To perform a specific, dedicated function
What is a badge reader used for in building security?
To detect motion at entry points
To provide lighting at entry points
To record the time employees leave the building
To authenticate users quickly at access points
To authenticate users quickly at access points
What is a vulnerability in integrating ICS/SCADA systems with corporate data networks?
Improved system interoperability
Enhanced data flow and efficiency
Vulnerable links that can be exploited
Increased system redundancy
Vulnerable links that can be exploited
You're concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action to stop or prevent the attack, if possible.
Which tool should you use?
Port scanner
Packet sniffer
IDS
IPS
IPS
What is a triple homed firewall configuration?
A configuration with three internal firewalls
A firewall setup without a perimeter network
A setup with three external firewalls
A firewall with three network interfaces
A firewall with three network interfaces
What is a "data historian" in the context of an ICS?
A database generated by the control loop
A communication protocol for PLCs
A cybersecurity tool for industrial networks
A backup server for industrial data
A database generated by the control loop
What can an organization use geofencing for?
To monitor the productivity of their employees
To increase the speed of their internet connection
To control the use of camera functions on devices
To improve the accuracy of their GPS systems
To control the use of camera functions on devices
What feature allows a security camera to survey a large room and pick out individual faces?
Coaxial cabling
Pan-Tilt-Zoom (PTZ) controls
Narrow focal length
Fixed positioning
Pan-Tilt-Zoom (PTZ) controls
What is the role of the screening firewall in a screened subnet?
To connect directly to the LAN
To filter communications between hosts in the perimeter and the LAN
To provide unrestricted access to the Internet
To restrict traffic on the external/public interface
To restrict traffic on the external/public interface