An attacker uses a list of commonly used access credentials to attempt to gain access to an online account.
Which malicious attack strategy is represented in the scenario?
Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to test DNS resolution against a host.
Which command in Linux should be used for this purpose?
A company is designing an information system and is maintaining a focus on the user experience and resulting productivity rather than on the technology itself.
What is the security principle implemented in this scenario?
When setting up a network, a technician needs a router that creates an access point.
Which router should be used?
An organization is the victim of an attack in which an attacker gains unauthorized access to a computer to steal information and forward it via the internet to another attacker.
What is the purpose of this attack?
An organization's network has been the target of several cyberattacks.
Which strategy should the organization use for Wi-Fi hardening?
Which scenario demonstrates a violation of the integrity component of the CIA triad?
In order to reduce the risk of insider attacks, a company assigns role-based permissions to its users.
Which network security concept does this scenario address?
In the process of setting up a Linux-based network system, a technician needs to determine if there is connectivity to a hostname.
Which command should be used?
Which layer of the OSI model includes the TCP?
An organization is the victim of an attack in which an attacker uses a forged employee ID card to deceive a company employee into providing sensitive information.
What is the type of cyberattack described in this scenario?
A computer network has software that tracks successful and unsuccessful connection attempts to the network in order to better identify attacks.
Which network security concept does this scenario address?
After recently experiencing a security breach, a company is working on improving its database security. As a part of its security governance strategies, the company is developing a database security checklist.
Which component is important to include in this checklist?
An attacker issues commands to access a file on a network drive and overwrite it with new data.
What is the purpose of the attack?
A company wants to implement a cloud service to obtain access to virtual machines. The company wants to be able to choose the operating systems and configure each of the machines.
What is the type of cloud service model that fits the needs of this company?
Which CIA triad component is a driver for enabling role-based access controls?
A company is ensuring that its network protocol meets encryption standards.
What is the CIA triad component targeted in the scenario?