Deck 12: Industrial and Enterprise Networking

ملء الشاشة (f)
exit full mode
سؤال
An active card,which contains an internal battery,can provide a usable range of up to what distance?

A)100 m
B)150 m
C)200 m
D)250 m
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
In computer forensics,hidden data such as deleted files and file fragments are known as what term?

A)ambient data
B)transient data
C)tombstone data
D)low level data
سؤال
The first step of a response policy should be to secure the area.
سؤال
What two methods might be used by an ICS to control a physical system?

A)cyclical control system
B)actuating loop system
C)open loop system
D)closed loop system
سؤال
________________ is a process of investigating deeper data on a computerand will essentially autopsy the computer to discover hidden data,such asdeleted files and file fragments,and who has accessed that data and when.
سؤال
eDiscovery and computer forensics reveal what two different types of data?

A)transient data
B)active data
C)ambient data
D)encrypted data
سؤال
A ______________ is an enclosure made of a conductive material that is designed to block electromagnetic signals,including Wi-Fi.
سؤال
Any device in an ICS that is motorized and cancontrol the physical system is called a fieldbus.
سؤال
What type of software is a correction,improvement,or enhancement to a piece of software?

A)patch
B)upgrade
C)rollback
D)kludge
سؤال
What team member role coordinates the resources necessary to solve a problem?

A)dispatcher
B)manager
C)technical support specialist
D)public relations specialist
سؤال
Cipherlocks are not designed for physical security,such as on an outside door.
سؤال
The first step in asset management is to inventory all the components on the network.
سؤال
Every security policy should include a response policy,which specifically defines the characteristicsof an event that qualifies as a formal incident and the steps that should be followedas a result.
سؤال
A rollback is also known by what two terms below?

A)backleveling
B)backstepping
C)downleveling
D)downgrading
سؤال
Microsoft sometimes releases a majorgroup of patches to Windows or a Microsoft application,which it calls a __________________.
سؤال
The goal of a disaster recovery plan is to ensure ______________.
سؤال
What two terms describe the process that can reveal a great deal of information,called ESI (electronically stored information)?

A)active data
B)eDiscovery
C)electronic discovery
D)ambient data
سؤال
A server that collects and stores raw data,and connects to field devices from which it receives raw data and passes data on to other SCADA systems,is known as what two terms below?

A)loop server
B)master terminal unit
C)acquisitions server
D)I/O server
سؤال
Which team role is the person on call who first notices or is alerted to a problem?

A)manager
B)dispatcher
C)technical support specialist
D)public relations specialist
سؤال
A _____________ is a small network that is segmented from the rest of the network,and contains computers,called test beds.
سؤال
At what type of recovery site would computers,devices,and connectivity necessary to rebuilt a network exist,and all are appropriately configured,updated,and connected to match your network's current state?

A)cold site
B)warm site
C)temp site
D)hot site
سؤال
What should be the first step of a response policy?

A)Determine if escalation is necessary
B)Secure the area
C)Document the scene
D)Monitor evidence and data collection
سؤال
Which of the following is NOT a step that should be taken as part of a response policy?

A)Secure the area and disconnect devices from the network
B)Create documentation detailing the scene
C)Attempt to access files to determine if they are compromised
D)Protect the chain of custody of evidence
سؤال
In order to provide access to a historian by personnel working on the corporate network that are not authorized to work on the ICS network,where should the historian be placed?

A)DMZ
B)corporate network
C)Internet
D)private network
سؤال
Explain what an RFP is.
سؤال
What team member role focuses on only one thing: solving the problem as quickly as possible?

A)dispatcher
B)manager
C)technical support specialist
D)public relations specialist
سؤال
When performing inventory on software packages,which of the following is not something that should be inventoried?

A)version number
B)vendor
C)licensing
D)proprietary source code
سؤال
What is a historian?

A)A centralized database of collected and analyzed data and control activities.
B)A server that collects and stores raw data.
C)A supervisory computer or server,which can control the physical system.
D)Computers,including hardware and software,that people use to monitor and manage the physical systems.
سؤال
What team member role,if necessary,learns about the situation and the response and then acts as official spokesperson for the organization to the public or other interested parties?

A)dispatcher
B)manager
C)technical support specialist
D)public relations specialist
سؤال
What type of physical security solution involves a device that scans an individual's unique physical characteristics?

A)proximity access
B)biorecognition access
C)AIT access
D)keypad access
سؤال
The time period in which a change can be implemented is known as what option below?

A)change period
B)maintenance window
C)work order time
D)service affecting work interval
سؤال
What are three different changes that you might be required to perform on existing software?
سؤال
Describe a service level agreement.
سؤال
Explain what a memorandum of understanding (MOU)is.
سؤال
Which type of disaster recovery site is a place where the computers,devices,and connectivity necessary to rebuild a network exist,but they are not appropriately configured,updated,or connected?

A)cold site
B)temp site
C)warm site
D)hot site
سؤال
If a destructive program is running that might be destroying evidence,what should be done?

A)Perform an immediate full backup
B)Attempt to end the process
C)Pull the power cable
D)Record the destruction using a video capture of the screen
سؤال
What should be in a disaster recovery plan that relates to computers?
سؤال
Upon receipt of what type of notification is a company required to activate a defensible policy for the preservation of relevant data?

A)subpoena
B)legal hold
C)discovery request
D)chain of custody notice
سؤال
What type of device can be used to erase contents of a hard drive using a magnetic field?

A)electromagnetic resonance chamber
B)degausser
C)targeted magneto-wipe
D)polarized magnet
سؤال
Which type of recovery site is a place where computers,devices,and connectivity necessary to rebuild a network exist,with some pieces appropriately configured,updated,or connected?

A)cold site
B)warm site
C)hot site
D)temp site
سؤال
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
An electronic access badge.
سؤال
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A magnetic hard drive eraser.
سؤال
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A supervisory computer orserver in an ICS or SCADA system that controls thephysical system.Also called the control server or theSCADA server.
سؤال
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A method of authentication in whicha device scans an individual's unique physical characteristics,such as the color patterns in her iris or the geometry of herhand,to verify the user's identity.
سؤال
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A term that sometimes refers to wired communication,but generally refers to wireless communication thattransmits data regarding specific measurements and conditions,such as weather data transmitted from a weather balloonto ground antennas.
سؤال
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
An ICS server that collects and storesraw data.This server connects to field devices from which itreceives the raw data and passes that information on to otherservers in the SCADA system.
سؤال
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A computer,includinghardware and software,that technicians use to monitor andmanage physical systems in an industrial system.
سؤال
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A smart card that does not require direct contactwith a proximity reader in order to be detected and read.
سؤال
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A document that details the workthat must be completed for a particular project,includingspecifics such as tasks,deliverables,standards,paymentschedule,and work timeline.
سؤال
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
An enclosure made of conductive material thatis designed to block electromagnetic signals,including Wi-Fi.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Industrial and Enterprise Networking
1
An active card,which contains an internal battery,can provide a usable range of up to what distance?

A)100 m
B)150 m
C)200 m
D)250 m
B
2
In computer forensics,hidden data such as deleted files and file fragments are known as what term?

A)ambient data
B)transient data
C)tombstone data
D)low level data
A
3
The first step of a response policy should be to secure the area.
False
4
What two methods might be used by an ICS to control a physical system?

A)cyclical control system
B)actuating loop system
C)open loop system
D)closed loop system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
________________ is a process of investigating deeper data on a computerand will essentially autopsy the computer to discover hidden data,such asdeleted files and file fragments,and who has accessed that data and when.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
eDiscovery and computer forensics reveal what two different types of data?

A)transient data
B)active data
C)ambient data
D)encrypted data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
A ______________ is an enclosure made of a conductive material that is designed to block electromagnetic signals,including Wi-Fi.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
Any device in an ICS that is motorized and cancontrol the physical system is called a fieldbus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
What type of software is a correction,improvement,or enhancement to a piece of software?

A)patch
B)upgrade
C)rollback
D)kludge
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
What team member role coordinates the resources necessary to solve a problem?

A)dispatcher
B)manager
C)technical support specialist
D)public relations specialist
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Cipherlocks are not designed for physical security,such as on an outside door.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
The first step in asset management is to inventory all the components on the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Every security policy should include a response policy,which specifically defines the characteristicsof an event that qualifies as a formal incident and the steps that should be followedas a result.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
A rollback is also known by what two terms below?

A)backleveling
B)backstepping
C)downleveling
D)downgrading
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Microsoft sometimes releases a majorgroup of patches to Windows or a Microsoft application,which it calls a __________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
The goal of a disaster recovery plan is to ensure ______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
What two terms describe the process that can reveal a great deal of information,called ESI (electronically stored information)?

A)active data
B)eDiscovery
C)electronic discovery
D)ambient data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
A server that collects and stores raw data,and connects to field devices from which it receives raw data and passes data on to other SCADA systems,is known as what two terms below?

A)loop server
B)master terminal unit
C)acquisitions server
D)I/O server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which team role is the person on call who first notices or is alerted to a problem?

A)manager
B)dispatcher
C)technical support specialist
D)public relations specialist
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
A _____________ is a small network that is segmented from the rest of the network,and contains computers,called test beds.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
At what type of recovery site would computers,devices,and connectivity necessary to rebuilt a network exist,and all are appropriately configured,updated,and connected to match your network's current state?

A)cold site
B)warm site
C)temp site
D)hot site
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
What should be the first step of a response policy?

A)Determine if escalation is necessary
B)Secure the area
C)Document the scene
D)Monitor evidence and data collection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which of the following is NOT a step that should be taken as part of a response policy?

A)Secure the area and disconnect devices from the network
B)Create documentation detailing the scene
C)Attempt to access files to determine if they are compromised
D)Protect the chain of custody of evidence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
In order to provide access to a historian by personnel working on the corporate network that are not authorized to work on the ICS network,where should the historian be placed?

A)DMZ
B)corporate network
C)Internet
D)private network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Explain what an RFP is.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
What team member role focuses on only one thing: solving the problem as quickly as possible?

A)dispatcher
B)manager
C)technical support specialist
D)public relations specialist
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
When performing inventory on software packages,which of the following is not something that should be inventoried?

A)version number
B)vendor
C)licensing
D)proprietary source code
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
What is a historian?

A)A centralized database of collected and analyzed data and control activities.
B)A server that collects and stores raw data.
C)A supervisory computer or server,which can control the physical system.
D)Computers,including hardware and software,that people use to monitor and manage the physical systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
What team member role,if necessary,learns about the situation and the response and then acts as official spokesperson for the organization to the public or other interested parties?

A)dispatcher
B)manager
C)technical support specialist
D)public relations specialist
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
What type of physical security solution involves a device that scans an individual's unique physical characteristics?

A)proximity access
B)biorecognition access
C)AIT access
D)keypad access
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
The time period in which a change can be implemented is known as what option below?

A)change period
B)maintenance window
C)work order time
D)service affecting work interval
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
What are three different changes that you might be required to perform on existing software?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Describe a service level agreement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
Explain what a memorandum of understanding (MOU)is.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which type of disaster recovery site is a place where the computers,devices,and connectivity necessary to rebuild a network exist,but they are not appropriately configured,updated,or connected?

A)cold site
B)temp site
C)warm site
D)hot site
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
If a destructive program is running that might be destroying evidence,what should be done?

A)Perform an immediate full backup
B)Attempt to end the process
C)Pull the power cable
D)Record the destruction using a video capture of the screen
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
What should be in a disaster recovery plan that relates to computers?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Upon receipt of what type of notification is a company required to activate a defensible policy for the preservation of relevant data?

A)subpoena
B)legal hold
C)discovery request
D)chain of custody notice
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
What type of device can be used to erase contents of a hard drive using a magnetic field?

A)electromagnetic resonance chamber
B)degausser
C)targeted magneto-wipe
D)polarized magnet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which type of recovery site is a place where computers,devices,and connectivity necessary to rebuild a network exist,with some pieces appropriately configured,updated,or connected?

A)cold site
B)warm site
C)hot site
D)temp site
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
An electronic access badge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A magnetic hard drive eraser.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A supervisory computer orserver in an ICS or SCADA system that controls thephysical system.Also called the control server or theSCADA server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A method of authentication in whicha device scans an individual's unique physical characteristics,such as the color patterns in her iris or the geometry of herhand,to verify the user's identity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A term that sometimes refers to wired communication,but generally refers to wireless communication thattransmits data regarding specific measurements and conditions,such as weather data transmitted from a weather balloonto ground antennas.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
An ICS server that collects and storesraw data.This server connects to field devices from which itreceives the raw data and passes that information on to otherservers in the SCADA system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A computer,includinghardware and software,that technicians use to monitor andmanage physical systems in an industrial system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A smart card that does not require direct contactwith a proximity reader in order to be detected and read.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
A document that details the workthat must be completed for a particular project,includingspecifics such as tasks,deliverables,standards,paymentschedule,and work timeline.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Matching
Match each correct item with the statement below.
a.acquisitions server
b.biorecognition access
c.degausser
d.Faraday cage
e.human-machine interfaces (HMI)
f.master terminal unit (MTU)
g.prox card
h.smart card
i.SOW (statement of work)
j.telemetry
An enclosure made of conductive material thatis designed to block electromagnetic signals,including Wi-Fi.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.