Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which statement describes the Integrity tenet of IT security?

A.

It involves transmitting network data without any errors.

B.

It requires the encryption of sensitive data transmission.

C.

It requires that network applications be accessible to users.

D.

It involves keeping systems accessible for network users.

Full Access
Question # 5

After a series of attacks, an organization needs to bolster its data protection measures.

Which strategy should be used to increase data protection?

A.

Use a variable network topology

B.

Have restoration policies in place

C.

Require that passwords change weekly

D.

Implement wired equivalent privacy (WEP)

Full Access
Question # 6

An organization does not have controls in place to limit employee access to sensitive customer data.

What is a component of the CIA triad that is violated?

A.

Confidentiality

B.

Integrity

C.

Availability

D.

Interpretation

Full Access
Question # 7

In order to reduce the risk of insider attacks, a company assigns role-based permissions to its users.

Which network security concept does this scenario address?

A.

Authentication

B.

Accounting

C.

Availability

D.

Authorization

Full Access
Question # 8

When setting up a network, a technician needs a router that connects computers together and connects computers to the internet.

Which router should be used?

A.

Inter-provider border router

B.

Subscriber edge router

C.

Broadband router

D.

Core router

Full Access
Question # 9

An attacker uses a list of commonly used access credentials to attempt to gain access to an online account.

Which malicious attack strategy is represented in the scenario?

A.

Phishing

B.

Dictionary attack

C.

Credential stuffing

D.

Social engineering

Full Access
Question # 10

An attacker uses malicious software to disable network resources, demanding a ransom to restore access.

Which category describes the purpose of the attack?

A.

Data modification

B.

Denial of availability

C.

Data export

D.

Launch point

Full Access
Question # 11

An organization is the victim of an attack in which an attacker uses a forged employee ID card to deceive a company employee into providing sensitive information.

What is the type of cyberattack described in this scenario?

A.

Brute-force attack

B.

Man-in-the-middle attack

C.

Social engineering

D.

Pharming

Full Access
Question # 12

A company is ensuring that its network protocol meets encryption standards.

What is the CIA triad component targeted in the scenario?

A.

Integrity

B.

Consistency

C.

Availability

D.

Confidentiality

Full Access
Question # 13

A host is already set up with an operating system. An administrator wants to install a hypervisor atop the operating system to allow for setting up virtual machines.

Which hypervisor should be used?

A.

Open source

B.

Proprietary

C.

Type 1

D.

Type 2

Full Access
Question # 14

Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to test DNS resolution against a host.

Which command in Linux should be used for this purpose?

A.

traceroute

B.

netstat

C.

dig

D.

ifconfig

Full Access
Question # 15

An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.

Which device should be used?

A.

Router

B.

Access point

C.

Server

D.

Switch

Full Access
Question # 16

An attacker sends emails claiming that an online account has been locked. The email provides a fake link with the goal of tricking users into providing login credentials.

Which malicious attack strategy is represented in the scenario?

A.

Phishing

B.

IP address spoofing

C.

Session hijacking

D.

Man-in-the-middle attack

Full Access
Question # 17

An organization has experienced a series of data breaches and needs to ensure that data remains protected even if intercepted.

Which security measure should be implemented?

A.

Role-based access control (RBAC)

B.

Two-factor authentication (2FA)

C.

Data encryption

D.

Patch management

Full Access
Question # 18

What is the component of the CIA triad for IT security that requires that IP packets be retransmitted if the receiving host has an invalid checksum value?

A.

Consistency

B.

Confidentiality

C.

Availability

D.

Integrity

Full Access