A company is developing a data protection methodology in order to improve data protection measures.
What is a strategy that should be used?
Which CIA triad component is a driver for enabling role-based access controls?
An organization is the victim of an attack in which an attacker gains unauthorized access to a computer to steal information and forward it via the internet to another attacker.
What is the purpose of this attack?
An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.
Which device should be used?
What is the layer of the OSI model that creates, maintains, and disconnects process communications over the network?
What is the TCP/IP layer that includes the User Datagram Protocol (UDP)?
An attacker uses malicious software to disable network resources, demanding a ransom to restore access.
Which category describes the purpose of the attack?
After a series of attacks, an organization needs to bolster its data protection measures.
Which strategy should be used to increase data protection?
An attacker sends emails claiming that an online account has been locked. The email provides a fake link with the goal of tricking users into providing login credentials.
Which malicious attack strategy is represented in the scenario?
Which layer of the OSI model includes HTTP?