Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

After recently experiencing a security breach, a company is working on improving its database security. As a part of its security governance strategies, the company is developing a database security checklist.

Which component is important to include in this checklist?

A.

Disclosing any instances of breaches of personal data

B.

Restricting physical access to locations where data is housed

C.

Developing algorithms for secure access to data

D.

Outsourcing data management to third-party vendors

A company has a legacy network in which all devices receive all messages transmitted by a central wire.

Which network topology is described?

A.

Star

B.

Point-to-point

C.

Bus

D.

Ring

An attacker uses a list of commonly used access credentials to attempt to gain access to an online account.

Which malicious attack strategy is represented in the scenario?

A.

Phishing

B.

Dictionary attack

C.

Credential stuffing

D.

Social engineering

Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to test DNS resolution against a host.

Which command in Linux should be used for this purpose?

A.

traceroute

B.

netstat

C.

dig

D.

ifconfig

A company wants to implement virtual machines with a focus on security and efficiency.

Which type of hypervisor fits the need described in the scenario?

A.

Open source

B.

Proprietary

C.

Type 1

D.

Type 2

What is a CIA triad component that involves keeping systems accessible for network users?

A.

Availability

B.

Innovation

C.

Integrity

D.

Confidentiality

With expanded business opportunities and markets, a company needs to comply with theGeneral Data Protection Regulation (GDPR).

Which requirement should be expected for the company under this regulation?

A.

Allow individuals to access, collect, or erase their personal information

B.

Compensate individuals for revenue from the sale of their information

C.

Disclose the software used to protect personal data

D.

Notify individuals each time their personal information is viewed

An organization is the victim of an attack in which an attacker uses a forged employee ID card to deceive a company employee into providing sensitive information.

What is the type of cyberattack described in this scenario?

A.

Brute-force attack

B.

Man-in-the-middle attack

C.

Social engineering

D.

Pharming