An attacker uses malicious software to disable network resources, demanding a ransom to restore access.
Which category describes the purpose of the attack?
A company is developing a data protection methodology in order to improve data protection measures.
What is a strategy that should be used?
An organization is the victim of an attack in which an attacker gains unauthorized access to a computer to steal information and forward it via the internet to another attacker.
What is the purpose of this attack?
An organization is the victim of an attack in which an attacker uses a forged employee ID card to deceive a company employee into providing sensitive information.
What is the type of cyberattack described in this scenario?
A company wants to implement virtual machines with a focus on security and efficiency.
Which type of hypervisor fits the need described in the scenario?
An organization is updating its information security policies in order to comply with thePersonal Information Protection and Electronic Documents Act (PIPEDA).
What should this organization expect to be required under this legislation?
A person is troubleshooting a network issue and needs to see details about network adapters and their settings.
Which Windows command should be used?
Which layer of the OSI model includes HTTP?
Which component of the IT securityCIA triadis a driver for enabling data encryption?
An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.
Which device should be used?
An organization is evaluating its internal network. Currently, each device is connected to two adjacent devices, one on either side.
Which type of network topology is being used?
A host is already set up with an operating system. An administrator wants to install a hypervisor atop the operating system to allow for setting up virtual machines.
Which hypervisor should be used?
An organization's network has been the target of several cyberattacks.
Which strategy should the organization use for Wi-Fi hardening?
After recently experiencing a security breach, a company is working on improving its database security. As a part of its security governance strategies, the company is developing a database security checklist.
Which component is important to include in this checklist?
A company has a legacy network in which all devices receive all messages transmitted by a central wire.
Which network topology is described?
A company is specifically worried about buffer overflow attacks.
Which strategy should be used as a mitigation against this type of attack?
Which scenario demonstrates a violation of the integrity component of the CIA triad?
An organization is the victim of an attack in which an attacker targets a computer to use as a tool to infect and target other computers in a larger attack.
What is the purpose of this attack?