Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free Network-and-Security-Foundation Questions Attempt

Network-and-Security-Foundation Questions and Answers

Question 13

A computer network has software that tracks successful and unsuccessful connection attempts to the network in order to better identify attacks.

Which network security concept does this scenario address?

Options:

A.

Accounting

B.

Authentication

C.

Availability

D.

Authorization

Question 14

After recently experiencing a security breach, a company is working on improving its database security. As a part of its security governance strategies, the company is developing a database security checklist.

Which component is important to include in this checklist?

Options:

A.

Disclosing any instances of breaches of personal data

B.

Restricting physical access to locations where data is housed

C.

Developing algorithms for secure access to data

D.

Outsourcing data management to third-party vendors

Question 15

An attacker issues commands to access a file on a network drive and overwrite it with new data.

What is the purpose of the attack?

Options:

A.

Data modification

B.

Launch point

C.

Data export

D.

Denial of availability

Question 16

A company wants to implement a cloud service to obtain access to virtual machines. The company wants to be able to choose the operating systems and configure each of the machines.

What is the type of cloud service model that fits the needs of this company?

Options:

A.

Function as a Service (FaaS)

B.

Infrastructure as a Service (IaaS)

C.

Platform as a Service (PaaS)

D.

Software as a Service (SaaS)