After recently experiencing a security breach, a company is working on improving its database security. As a part of its security governance strategies, the company is developing a database security checklist.
Which component is important to include in this checklist?
A company has a legacy network in which all devices receive all messages transmitted by a central wire.
Which network topology is described?
An attacker uses a list of commonly used access credentials to attempt to gain access to an online account.
Which malicious attack strategy is represented in the scenario?
Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to test DNS resolution against a host.
Which command in Linux should be used for this purpose?
A company wants to implement virtual machines with a focus on security and efficiency.
Which type of hypervisor fits the need described in the scenario?
What is a CIA triad component that involves keeping systems accessible for network users?
With expanded business opportunities and markets, a company needs to comply with theGeneral Data Protection Regulation (GDPR).
Which requirement should be expected for the company under this regulation?
An organization is the victim of an attack in which an attacker uses a forged employee ID card to deceive a company employee into providing sensitive information.
What is the type of cyberattack described in this scenario?