What is an IT infrastructure security tenet of the CIA triad that counters passive attacks that aim to steal or intercept data?
An organization is the victim of an attack in which an attacker gains unauthorized access to a computer to steal information and forward it via the internet to another attacker.
What is the purpose of this attack?
A person is troubleshooting a network issue and needs to see details about network adapters and their settings.
Which Windows command should be used?
An organization is the victim of an attack in which an attacker targets a computer to use as a tool to infect and target other computers in a larger attack.
What is the purpose of this attack?
An organization is the victim of an attack in which an attacker intercepts messages between two parties before transferring them to the correct destination.
What is the type of cyberattack described in this scenario?
A company wants to implement virtual machines with a focus on security and efficiency.
Which type of hypervisor fits the need described in the scenario?
A company wants to implement a cloud service to obtain access to virtual machines. The company wants to be able to choose the operating systems and configure each of the machines.
What is the type of cloud service model that fits the needs of this company?
What is the component of the CIA triad for IT security that requires that IP packets be retransmitted if the receiving host has an invalid checksum value?
A company is developing a data protection methodology in order to improve data protection measures.
What is a strategy that should be used?
An attacker uses login data from a data breach to attempt to access another web service.
Which malicious attack strategy is represented in the scenario?
An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.
Which device should be used?
An attacker sends emails claiming that an online account has been locked. The email provides a fake link with the goal of tricking users into providing login credentials.
Which malicious attack strategy is represented in the scenario?
A host is already set up with an operating system. An administrator wants to install a hypervisor atop the operating system to allow for setting up virtual machines.
Which hypervisor should be used?
A start-up company wants to build its computer network by starting with the base-level resources offered by a cloud service. In this way, the company won't have to buy physical hardware but canstill have complete control over operating systems and other software.
Which cloud service model should be used?