Month End Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

What is an IT infrastructure security tenet of the CIA triad that counters passive attacks that aim to steal or intercept data?

A.

Adaptation

B.

Confidentiality

C.

Availability

D.

Integrity

Full Access
Question # 5

An organization is the victim of an attack in which an attacker gains unauthorized access to a computer to steal information and forward it via the internet to another attacker.

What is the purpose of this attack?

A.

Launch point

B.

Denial of availability

C.

Data export

D.

Data modification

Full Access
Question # 6

Which layer of the OSI model includes the ICMP?

A.

Transport

B.

Session

C.

Network

D.

Application

Full Access
Question # 7

A person is troubleshooting a network issue and needs to see details about network adapters and their settings.

Which Windows command should be used?

A.

ipconfig

B.

traceroute

C.

nslookup

D.

netstat

Full Access
Question # 8

An organization is the victim of an attack in which an attacker targets a computer to use as a tool to infect and target other computers in a larger attack.

What is the purpose of this attack?

A.

Denial of availability

B.

Data export

C.

Data modification

D.

Launch point

Full Access
Question # 9

An organization is the victim of an attack in which an attacker intercepts messages between two parties before transferring them to the correct destination.

What is the type of cyberattack described in this scenario?

A.

Credential stuffing

B.

Social engineering

C.

Pharming

D.

Man-in-the-middle attack

Full Access
Question # 10

A company wants to implement virtual machines with a focus on security and efficiency.

Which type of hypervisor fits the need described in the scenario?

A.

Open source

B.

Proprietary

C.

Type 1

D.

Type 2

Full Access
Question # 11

A company wants to implement a cloud service to obtain access to virtual machines. The company wants to be able to choose the operating systems and configure each of the machines.

What is the type of cloud service model that fits the needs of this company?

A.

Function as a Service (FaaS)

B.

Infrastructure as a Service (IaaS)

C.

Platform as a Service (PaaS)

D.

Software as a Service (SaaS)

Full Access
Question # 12

What is the component of the CIA triad for IT security that requires that IP packets be retransmitted if the receiving host has an invalid checksum value?

A.

Consistency

B.

Confidentiality

C.

Availability

D.

Integrity

Full Access
Question # 13

A company is developing a data protection methodology in order to improve data protection measures.

What is a strategy that should be used?

A.

Use a variable network topology

B.

Increase wireless access point range

C.

Enhance physical resource security

D.

Implement wired equivalent privacy (WEP)

Full Access
Question # 14

An attacker uses login data from a data breach to attempt to access another web service.

Which malicious attack strategy is represented in the scenario?

A.

Brute-force attack

B.

Credential stuffing

C.

Session hijacking

D.

Social engineering

Full Access
Question # 15

An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.

Which device should be used?

A.

Router

B.

Access point

C.

Server

D.

Switch

Full Access
Question # 16

An attacker sends emails claiming that an online account has been locked. The email provides a fake link with the goal of tricking users into providing login credentials.

Which malicious attack strategy is represented in the scenario?

A.

Phishing

B.

IP address spoofing

C.

Session hijacking

D.

Man-in-the-middle attack

Full Access
Question # 17

A host is already set up with an operating system. An administrator wants to install a hypervisor atop the operating system to allow for setting up virtual machines.

Which hypervisor should be used?

A.

Open source

B.

Proprietary

C.

Type 1

D.

Type 2

Full Access
Question # 18

A start-up company wants to build its computer network by starting with the base-level resources offered by a cloud service. In this way, the company won't have to buy physical hardware but canstill have complete control over operating systems and other software.

Which cloud service model should be used?

A.

Software as a Service (SaaS)

B.

Function as a Service (FaaS)

C.

Infrastructure as a Service (IaaS)

D.

Platform as a Service (PaaS)

Full Access