What is a CIA triad component that involves keeping systems accessible for network users?
An attacker sends emails claiming that an online account has been locked. The email provides a fake link with the goal of tricking users into providing login credentials.
Which malicious attack strategy is represented in the scenario?
A company is ensuring that its network protocol meets encryption standards.
What is the CIA triad component targeted in the scenario?
What is an IT infrastructure security tenet of the CIA triad that counters passive attacks that aim to steal or intercept data?
A company grants users permissions based on the department in which users work.
Which type of access control is involved?
An organization does not have controls in place to limit employee access to sensitive customer data.
What is a component of the CIA triad that is violated?
Which layer of the TCP/IP model includes the Internet Protocol (IP)?
An attacker uses a list of commonly used access credentials to attempt to gain access to an online account.
Which malicious attack strategy is represented in the scenario?
After recently experiencing a security breach, a company is working on improving its database security. As a part of its security governance strategies, the company is developing a database security checklist.
Which component is important to include in this checklist?
Which scenario demonstrates a violation of the integrity component of the CIA triad?
An attacker uses a network device to take over an existing connection between two network computers.
Which malicious attack strategy is represented in the scenario?
A company wants to use a cloud service to obtain virtual machines with pre-installed and configured software.
Which cloud service model should be used?
A host is already set up with an operating system. An administrator wants to install a hypervisor atop the operating system to allow for setting up virtual machines.
Which hypervisor should be used?
Access to a company's information system requires a user to be within a valid geographic location and to enter a valid username and password.
Which concept does this scenario demonstrate?
A company is developing a disaster recovery plan for its internal network.
What is the CIA triad component targeted in the scenario?
An organization is the victim of an attack in which an attacker uses a forged employee ID card to deceive a company employee into providing sensitive information.
What is the type of cyberattack described in this scenario?
What is the TCP/IP layer that includes the User Datagram Protocol (UDP)?
An attacker changes a computer's identification to appear as an authorized computer in a target network.
Which type of cyberattack is described?