100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
INMT 441 EXAM 2 TEST QUESTIONS WITH REVISED AND UPDATED ANSWERS $12.49   Add to cart

Exam (elaborations)

INMT 441 EXAM 2 TEST QUESTIONS WITH REVISED AND UPDATED ANSWERS

 3 views  0 purchase
  • Course
  • INMT 441
  • Institution
  • INMT 441

INMT 441 EXAM 2 TEST QUESTIONS WITH REVISED AND UPDATED ANSWERS Internet of Things (IoT) - Answer-the network of physical objects that are embedded with software or sensors that allow them to gather and distribute data over the internet -was based on RFID technology -depends on the interoperabi...

[Show more]

Preview 2 out of 15  pages

  • October 24, 2024
  • 15
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • INMT 441
  • INMT 441
avatar-seller
victoryguide
INMT 441 EXAM 2 TEST QUESTIONS
WITH REVISED AND UPDATED
ANSWERS
Internet of Things (IoT) - Answer-the network of physical objects that are embedded
with software or sensors that allow them to gather and distribute data over the internet
-was based on RFID technology
-depends on the interoperability, extensibility, scalability and modularity of it.

Sensing Layer - Answer-is integrated with available hardware objects to sense the
statuses of things

Network Layer - Answer-is the infrastructure to support over wireless or wired
connections among things

Service Application Layer - Answer-is to create and manage services required by users
or applications

Interfaces Layer - Answer-consists of the interaction methods with users or applications

Applications of IoT - Answer--Comsumer Applications
ex. smart home, healthcare
-Industrial Applications
ex. industry 4.0
-Infrastructure Applications
ex. smart city

IoT Security Issues - Answer--interdependence between devices (in general)
-diversity/heterogeneity of devices (in general)
-limited computing resources per individual device
-unattended devices
-myriad of data (device specific)
-intimate relationship with uses (device specific)
-mobility (device specific)
-Ubiquity/Mass use

Firewall - Answer-software that runs on servers (often routers) that only allows traffic
through according to some set of security rules.

, Circuit level gateway firewall - Answer-A firewall used to manage communication
sessions between trusted partners. It operates at the Session layer (layer 5) of the OSI
model.

Application level firewall - Answer-Application-layer firewalls operate
at the application layer of the OSI
model. Application layer firewalls
can inspect data packets traveling to
or from an application. filters via intended characteristics but also others such as the
HTTP request string.

Stateful Inspection Firewall - Answer-A firewall that filters and examines data packets
but also keeps track of whether or not that packet is part of an established TCP or other
network session.

Next Generation Firewall - Answer-combines packet inspection with stateful inspection
and also includes some variety of deep packet inspection features as well as other
network security systems such as malware filtering and anti-virus.

Firewall Limitations - Answer--not creative
-deal strictly with defined patterns of measured observations
-programming errors
-designed to function within limits of hardware capacity.
-can only respond to what is expected
-human error

Proxy Servers - Answer-a server or application that acts as an intermediary for requests
from clients seeking resources from servers
-both incoming and outgoing
-server/client identities are hidden

Virtual Private Network (VPN) - Answer-Companies can establish direct private network
links among themselves or create private, secure Internet access, in effect a "private
tunnel" within the public network
-requires authentication
-enhances message integrity and confidentiality

Instrusion Detection System (IDS) - Answer-work like burglar alarms and combine tried
and true detection methods from intrusion detection systems with the capability to react
to changes in the environment which is available in intrusion prevention technologies
-can both detect and prevent

Intrusion Detection and Prevention Systems can prevent attacks via: - Answer--
terminating the network connection or attacker's user session
-changing the security environment by reconfiguring network devices to block access to
the targeted system

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller victoryguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.49
  • (0)
  Add to cart