A company is developing a disaster recovery plan for its internal network.
What is the CIA triad component targeted in the scenario?
Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to test DNS resolution against a host.
Which command in Linux should be used for this purpose?
What is a CIA triad component that involves keeping systems accessible for network users?
A start-up company wants to build its computer network by starting with the base-level resources offered by a cloud service. In this way, the company won't have to buy physical hardware but canstill have complete control over operating systems and other software.
Which cloud service model should be used?
A company is specifically worried about rogue access points.
Which strategy should be used as a mitigation against this type of attack?
A company is ensuring that its network protocol meets encryption standards.
What is the CIA triad component targeted in the scenario?
An attacker uses malicious software to disable network resources, demanding a ransom to restore access.
Which category describes the purpose of the attack?
A company wants to implement a cloud service to obtain access to virtual machines. The company wants to be able to choose the operating systems and configure each of the machines.
What is the type of cloud service model that fits the needs of this company?
An organization has experienced injection attacks in the past and wants to take actions to mitigate this type of attack.
What should this organization do?
A company is developing a data protection methodology in order to improve data protection measures.
What is a strategy that should be used?
An organization is the victim of an attack in which an attacker targets a computer to use as a tool to infect and target other computers in a larger attack.
What is the purpose of this attack?
An organization is the victim of an attack in which an attacker intercepts messages between two parties before transferring them to the correct destination.
What is the type of cyberattack described in this scenario?