Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Network-and-Security-Foundation Exam Questions Tutorials

Network-and-Security-Foundation Questions and Answers

Question 9

In order to reduce the risk of insider attacks, a company assigns role-based permissions to its users.

Which network security concept does this scenario address?

Options:

A.

Authentication

B.

Accounting

C.

Availability

D.

Authorization

Question 10

In the process of setting up a Linux-based network system, a technician needs to determine if there is connectivity to a hostname.

Which command should be used?

Options:

A.

ping

B.

nslookup

C.

ifconfig

D.

dig

Question 11

Which layer of the OSI model includes the TCP?

Options:

A.

Application

B.

Transport

C.

Session

D.

Network

Question 12

An organization is the victim of an attack in which an attacker uses a forged employee ID card to deceive a company employee into providing sensitive information.

What is the type of cyberattack described in this scenario?

Options:

A.

Brute-force attack

B.

Man-in-the-middle attack

C.

Social engineering

D.

Pharming