Correct Answer: You Answered
Correct Answer: You Answered
0 / 2 pts
Which network environment is suitable for a Media Access Control (MAC)
address spoofing attack?
Correct Answer
You Answered
on a WAN connection
Question 2
0 / 2 pts
A threat actor uses a program to launch an attack by sending a flood of UDP
packets to a server on the network. The program sweeps through all of the known
ports trying to find closed ports. It causes the server to reply with an ICMP port
unreachable message and is similar to a DoS attack. Which two programs could be
used by the threat actor to launch the attack? (Choose two.)
You Answered
WireShark
You Answered
Smurf
Correct Answer
UDP Unicorn
ping
Question 3
0.5 / 2 pts
After host A receives a web page from server B, host A terminates the connection
with server B. Match each option to its correct step in the normal termination
proccess for a TCP connection.
You Answered
Host A sends an ACK to server B.
Correct Answer
Step 4
Correct!
Server B sends a FIN to host A.
You Answered
Host A sends a FIN to server B.
Correct Answer
Step 1
You Answered
Server B sends an ACK to host A.
Correct Answer
Step 2
Refer to curriculum topic: 4.2.2
Question 4
2 / 2 pts
Which customized IEEE 802.15.4 wireless topology can contain a large amount of
full function devices and a small amount of reduced function devices?
star
Correct!
cluster-tree
hub-and-spoke
mesh
Question 5
0 / 2 pts
Which basic security service protects against alteration of data while it is in
transit?
You Answered
replay protection
Correct Answer
message integrity
access control
message confidentiality
Question 6
0 / 2 pts
A threat actor uses non-blind spoofing to launch an attack. What are two
objectives for the attack? (Choose two.)
Correct!
You Answered
Correct Answer
determining the state of a firewall
Question 7
0 / 2 pts
Which parameter is used to identify applications when a user sends a service
request to a remote server?
Correct Answer
You Answered
server IP address
Question 8
0 / 2 pts
What are two of the most common wireless technologies used in home
automation and home security applications? (Choose two.)
IEEE 802.15.4
Correct!
Wi-Fi
Correct Answer
Bluetooth
cellular
Question 9
0 / 2 pts
Which attack commonly includes the use of botnet and handler systems?
You Answered
ICMP attack
Correct Answer
DDoS attack
DoS attack
Question 10
0 / 2 pts
Which two application layer protocols use UDP? (Choose two.)
Correct Answer
DHCP
You Answered
HTTP
Correct!
TFTP
FTP
HTTPS
Question 11
0 / 2 pts
Which devices scan and infect more targets during the process of a DDoS attack?
CnC servers
You Answered
botmasters
web servers
Correct Answer
zombies
Question 12
0 / 2 pts
Which IoT wireless option is commonly used by devices that require a low power
wide-area network connection and do not use a fixed power supply?
ZigBee
Correct Answer
LoRaWAN
thread
You Answered
cellular
Question 13
0 / 2 pts
In which type of scenario would an IoT gateway not be required to convert traffic
to Wi-Fi or wired ethernet?
when smart objects forward data within a star topology
You Answered
Correct Answer
Question 14
0 / 2 pts
Which attack involves threat actors positioning themselves between a source and
destination with the intent of transparently monitoring, capturing, and controlling
the communication?
ICMP attack
Correct Answer
man-in-the-middle attack
DoS attack
You Answered
Question 15
0 / 2 pts
Which two types of attacks are typically carried out by using ICMP messages?
(Choose two.)
You Answered
password gathering
Correct!
reconnaissance
Correct Answer
DoS
relaying spam
Question 1
2 / 2 pts
Which network environment is suitable for a Media Access Control (MAC)
address spoofing attack?
Correct!
on a WAN connection
Question 2
0 / 2 pts
Which type of IoT wireless deployment would allow smart objects to be deployed
over a very large area?
Correct Answer
mesh topology
You Answered
star topology
IP capable topology
hub-and-spoke topology
Question 3
2 / 2 pts
Which parameter is used to identify applications when a user sends a service
request to a remote server?
source port number
server IP address
Correct!
Question 4
2 / 2 pts
When does the level of trust and reliability of data change during communication
between IoT systems?
Correct!
when data is generated by a device inside a trusted network and stays within the
network
when data is generated by a device within a DMZ and stays within the DMZ
Question 5
0 / 2 pts
Which OWASP communication layer vulnerability should be researched when
securing the IoT network traffic attack surface?
replay attack
Correct Answer
protocol fuzzing
unencrypted services
You Answered
injection
LAN traffic
LAN to internet traffic
short range
nonstandard protocols
wireless
packet manipulation (protocol fuzzing)
Question 6
2 / 2 pts
Which devices scan and infect more targets during the process of a DDoS attack?
web servers
botmasters
CnC servers
Correct!
zombies
Question 7
1.5 / 2 pts
After host A receives a web page from server B, host A terminates the connection
with server B. Match each option to its correct step in the normal termination
proccess for a TCP connection.
Correct!
Host A sends an ACK to server B.
Correct!
Server B sends a FIN to host A.
Correct!
Host A sends a FIN to server B.
You Answered
Server B sends an ACK to host A.
Correct Answer
Step 2
Refer to curriculum topic: 4.2.2
Question 8
0 / 2 pts
Which two OWASP communication layer vulnerabilities should be researched
when securing the IoT device network services attack surface? (Choose two.)
XBee
Correct Answer
information disclosure
You Answered
non-standard protocols
Correct!
Zigbee
Information disclosure
Injection
Denial of service
Unencrypted services
Poorly implemented encryption
Test/development services
Vulnerable UDP services
Replay attack
Lack of payload verification
Lack of message integrity check
Question 9
0 / 2 pts
A threat actor uses a program to launch an attack by sending a flood of UDP
packets to a server on the network. The program sweeps through all of the known
ports trying to find closed ports. It causes the server to reply with an ICMP port
unreachable message and is similar to a DoS attack. Which two programs could be
used by the threat actor to launch the attack? (Choose two.)
Correct Answer
UDP Unicorn
ping
WireShark
You Answered
Smurf
Correct!
Question 10
0 / 2 pts
A threat actor uses non-blind spoofing to launch an attack. What are two
objectives for the attack? (Choose two.)
You Answered
Correct!
Correct Answer
Question 11
0 / 2 pts
Which two techniques are used in a smurf attack? (Choose two.)
You Answered
botnets
You Answered
resource exhaustion
Correct Answer
amplification
Correct Answer
reflection
session hijacking
Refer to curriculum topic: 4.2.1
A smurf attack uses amplification and reflection techniques to overwhelm a
targeted host. The threat actor forwards ICMP echo request messages that
contain the source IP address of the victim to a large number of hosts. These hosts
all reply to the spoofed IP address of the victim with the intent of overwhelming
it.
Question 12
2 / 2 pts
Which customized IEEE 802.15.4 wireless topology can contain a large amount of
full function devices and a small amount of reduced function devices?
star
mesh
Correct!
cluster-tree
hub-and-spoke
Question 13
2 / 2 pts
Why would an engineer only use very short-range radios to allow sensor data to
travel from node to node until the data reaches the IoT gateway?
increased bandwidth
Correct!
power constraints
channel requirements
high availability
Question 14
0 / 2 pts
Which IoT wireless option is commonly used by devices that require a low power
wide-area network connection and do not use a fixed power supply?
thread
Correct Answer
LoRaWAN
You Answered
ZigBee
cellular
Question 15
0 / 2 pts
Which two types of attacks are typically carried out by using ICMP messages?
(Choose two.)
relaying spam
Correct Answer
DoS
Correct!
reconnaissance
You Answered
password gathering
Question 1
2 / 2 pts
Which type of IoT wireless deployment would allow smart objects to be deployed
over a very large area?
star topology
Correct!
mesh topology
IP capable topology
hub-and-spoke topology
DDoS attack
DoS attack
ICMP attack
Question 3
2 / 2 pts
Which two techniques are used in a smurf attack? (Choose two.)
Correct!
reflection
Correct!
amplification
resource exhaustion
session hijacking
botnets
Question 4
2 / 2 pts
Which attack involves threat actors positioning themselves between a source and
destination with the intent of transparently monitoring, capturing, and controlling
the communication?
Correct!
man-in-the-middle attack
DoS attack
ICMP attack
Question 5
0 / 2 pts
When does the level of trust and reliability of data change during communication
between IoT systems?
You Answered
when data is generated by a device inside a trusted network and stays within the
network
when data is generated by a device within a DMZ and stays within the DMZ
Correct Answer
Question 6
2 / 2 pts
Why would an engineer only use very short-range radios to allow sensor data to
travel from node to node until the data reaches the IoT gateway?
high availability
channel requirements
increased bandwidth
Correct!
power constraints
Wi-Fi
Correct!
Bluetooth
IEEE 802.15.4
cellular
Question 8
2 / 2 pts
Which two types of attacks are typically carried out by using ICMP messages?
(Choose two.)
Correct!
reconnaissance
password gathering
Correct!
DoS
relaying spam
Question 9
2 / 2 pts
Which devices scan and infect more targets during the process of a DDoS attack?
Correct!
zombies
CnC servers
botmasters
web servers
Question 10
2 / 2 pts
Which two OWASP communication layer vulnerabilities should be researched
when securing the IoT device network services attack surface? (Choose two.)
XBee
Correct!
Zigbee
non-standard protocols
Correct!
information disclosure
Information disclosure
Injection
Denial of service
Unencrypted services
Poorly implemented encryption
Test/development services
Vulnerable UDP services
Replay attack
Lack of payload verification
Lack of message integrity check
Question 11
2 / 2 pts
Which basic security service protects against alteration of data while it is in
transit?
access control
Correct!
message integrity
message confidentiality
replay protection
Question 12
0 / 2 pts
Which type of IoT wireless network would interconnect audio devices and smart
watches to a cell phone that serves as an IoT gateway?
You Answered
Correct Answer
Question 13
0 / 2 pts
A threat actor uses a program to launch an attack by sending a flood of UDP
packets to a server on the network. The program sweeps through all of the known
ports trying to find closed ports. It causes the server to reply with an ICMP port
unreachable message and is similar to a DoS attack. Which two programs could be
used by the threat actor to launch the attack? (Choose two.)
ping
Correct Answer
Correct!
UDP Unicorn
You Answered
Smurf
WireShark
Question 14
0 / 2 pts
Which two application layer protocols use UDP? (Choose two.)
HTTPS
Correct!
DHCP
You Answered
HTTP
Correct Answer
TFTP
FTP
Question 15
2 / 2 pts
In which type of scenario would an IoT gateway not be required to convert traffic
to Wi-Fi or wired ethernet?
Correct!