A company is specifically worried about buffer overflow attacks.
Which strategy should be used as a mitigation against this type of attack?
When setting up a network, a technician needs a router that creates an access point.
Which router should be used?
A developer is using shared functions for software code in order to reduce complexity, knowing that greater complexity and volume of code are harder to defend against attacks.
Which security principle is demonstrated in this scenario?
An attacker changes a computer's identification to appear as an authorized computer in a target network.
Which type of cyberattack is described?
Which layer of the OSI model includes the ICMP?
A start-up company wants to build its computer network by starting with the base-level resources offered by a cloud service. In this way, the company won't have to buy physical hardware but canstill have complete control over operating systems and other software.
Which cloud service model should be used?
When setting up a network, a technician needs a router that connects computers together and connects computers to the internet.
Which router should be used?
Which statement describes the Integrity tenet of IT security?
After a series of attacks, an organization needs to bolster its data protection measures.
Which strategy should be used to increase data protection?
Which scenario demonstrates a violation of the integrity component of the CIA triad?
A library has a network that allows patrons to use their mobile devices to connect to the internet.
Which type of network is described?
A company has a legacy network in which all devices receive all messages transmitted by a central wire.
Which network topology is described?
A computer network has software that tracks successful and unsuccessful connection attempts to the network in order to better identify attacks.
Which network security concept does this scenario address?
An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.
Which device should be used?
Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to test DNS resolution against a host.
Which command in Linux should be used for this purpose?
An attacker issues commands to access a file on a network drive and overwrite it with new data.
What is the purpose of the attack?
An attacker uses login data from a data breach to attempt to access another web service.
Which malicious attack strategy is represented in the scenario?
An attacker uses a poisoned domain name on the domain name server to navigate users to the attacker's site.
Which malicious attack strategy is represented in the scenario?