Which CIA triad component is a driver for enabling role-based access controls?
An attacker issues commands to access a file on a network drive and overwrite it with new data.
What is the purpose of the attack?
A company is developing a data protection methodology in order to improve data protection measures.
What is a strategy that should be used?
An organization has experienced rogue access points in the past and wants to take actions to mitigate this type of attack.
What should this organization do?
An organization is evaluating its internal network. Currently, each device is connected to two adjacent devices, one on either side.
Which type of network topology is being used?
Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to test DNS resolution against a host.
Which command in Linux should be used for this purpose?
An attacker changes a computer's identification to appear as an authorized computer in a target network.
Which type of cyberattack is described?
An attacker uses a poisoned domain name on the domain name server to navigate users to the attacker's site.
Which malicious attack strategy is represented in the scenario?
A company wants to implement virtual machines with a focus on security and efficiency.
Which type of hypervisor fits the need described in the scenario?
Which scenario demonstrates a violation of the integrity component of the CIA triad?
A library has a network that allows patrons to use their mobile devices to connect to the internet.
Which type of network is described?
What is the layer of the OSI model that creates, maintains, and disconnects process communications over the network?
A company is specifically worried about rogue access points.
Which strategy should be used as a mitigation against this type of attack?
A company wants to use a cloud service to obtain virtual machines with pre-installed and configured software.
Which cloud service model should be used?
An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.
Which device should be used?