We have five questions as usual. Nice, easy one for us. Question 1, how many bits are in the hardware address assigned to network devices? This is our Layer 2 address, known as the MAC address or the burned-in address. We know that it's formed of two sets of 24 bits, so 48 bit address. The first 24 bits is the manufacturer, the provider ID and then the 24 bits after that is the device identifier or the interface identifier, together, in theory, this is globally unique. Question 2, which response best describes the difference between a hub and a switch? Is it that a hub can improve performance and security in a network by sending packets only to the designated node? Is it that a switch can improve performance and security in a network by sending packets only to the designated node? Is it that a hub can improve performance and security in a network by sending frames only to the designated node? Is it that a switch can improve performance and security in a network by sending frames only to the designated node? Look at the first five words, which device improves performance? Was it a hub or a switch? We know that a hub is an old device, it does not improve performance. For this reason, we know that responses 1 and 3 are incorrect. A switch can improve performance. Now we have a shortlist for this question of responses 2 and 4. Do switches deal with packets though or frames? Response 2 talks about switches dealing with packets. Response 4 talks about the switch dealing with frames. Switches deal with frames. Just look at what we said in the chapter review. The third bullet point from bottom, switches, frames and MAC addresses relate to Layer 2. Again, that gave us the answer to our second question. Question 3, which cloud service model offers the most control over updates and patching schedules for the customer? Was this SaaS? Was this PaaS, was this public? Or was this hybrid? SaaS, we have almost no control or very limited control. PaaS we had more control and IaaS offered us the most control. IaaS isn't listed. The best option is PaaS. The public and the hybrid, they're not service models. Those are how they're deployed, are they deployed publicly? Are they deployed privately, or as a hybrid offer? The best response here is PaaS. SaaS offers less flexibility, PaaS offers more. Question 4 then, which control type helps to detect security incidents and also typically supports the aggregation of log files? Detect and aggregate. Is this an IDS? Is this an IPS? Is this a SIEM system, or is this network access control? Intrusion detection, intrusion prevention, security incident, event management or network access control? Now, the detection, all three can play a part in detection. The IDS detects, the IPS detects and prevents, the SIEM system detects, a network access control is detecting the configuration of the device that wants to connect. The key to the response is the aggregation of log files. Only one device here does the aggregation of log files, it is a SIEM system. It's a detective control that analyzes log files and it can group the outputs from different systems together and analyze them and it can combine those logical statements. If one system has this log event, another system has another log event, then do something, then configure an alert. An IDS and an IPS control the flow of traffic across a network. A network access control is determining what can and cannot connect to our network. None of these has anything to do really with aggregation or indeed log files. Question 5, which issue below is not one usually associated with IoT devices? Is this that rapid refresh cycles? May mean that security is not well implemented? Is it that IoT devices do not support encryption? Is it that devices may be low visibility on networks? Or is this that IoT devices may not be supported by manufacturers? Just a tip for any exam, I think to my mind, the may, a conditional is more likely to be true than an outright statement, often. Look at responses 1, 3 and 4, rapid refresh cycles may, devices may, IoT devices may. All of those are saying it's possible and it is possible. Usually, there is a possibility however small there is a possibility. Response 2 is saying IoT devices do not support encryption. All devices do not support encryption. Had it said, IoT devices may not support encryption, well, that would be true but actually, most IoT devices do support encryption. Not all, but most do. Not all of the configurations or implementations are good. The correct response here is 2. Rapid refresh cycles do mean that security is sometimes not well implemented, devices may be low visibility as per my fridge freezer and IoT devices may not be well-supported. Just a small exempt tip around some of the use of language there. Low visibility of many devices mean that organizations may not be as aware that the device exists or needs updating. It's not an obvious device. If you want, take a look at the new story, Google, how a Vegas casino was hacked through its fish tank. Low visibility device. Who would have thought to patch the firmware on a thermometer in a fish tank. Absolutely crazy. Now we've got a good question to finish our chapter on. Thank you for your attention and look forward to seeing you for our fifth chapter.