After a series of attacks, an organization needs to bolster its data protection measures.
Which strategy should be used to increase data protection?
An organization does not have controls in place to limit employee access to sensitive customer data.
What is a component of the CIA triad that is violated?
In order to reduce the risk of insider attacks, a company assigns role-based permissions to its users.
Which network security concept does this scenario address?
When setting up a network, a technician needs a router that connects computers together and connects computers to the internet.
Which router should be used?
An attacker uses a list of commonly used access credentials to attempt to gain access to an online account.
Which malicious attack strategy is represented in the scenario?
An attacker uses malicious software to disable network resources, demanding a ransom to restore access.
Which category describes the purpose of the attack?
An organization is the victim of an attack in which an attacker uses a forged employee ID card to deceive a company employee into providing sensitive information.
What is the type of cyberattack described in this scenario?
A company is ensuring that its network protocol meets encryption standards.
What is the CIA triad component targeted in the scenario?
A host is already set up with an operating system. An administrator wants to install a hypervisor atop the operating system to allow for setting up virtual machines.
Which hypervisor should be used?
Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to test DNS resolution against a host.
Which command in Linux should be used for this purpose?
An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.
Which device should be used?
An attacker sends emails claiming that an online account has been locked. The email provides a fake link with the goal of tricking users into providing login credentials.
Which malicious attack strategy is represented in the scenario?
An organization has experienced a series of data breaches and needs to ensure that data remains protected even if intercepted.
Which security measure should be implemented?
What is the component of the CIA triad for IT security that requires that IP packets be retransmitted if the receiving host has an invalid checksum value?