Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A company is developing a data protection methodology in order to improve data protection measures.

What is a strategy that should be used?

A.

Use a variable network topology

B.

Increase wireless access point range

C.

Enhance physical resource security

D.

Implement wired equivalent privacy (WEP)

Which CIA triad component is a driver for enabling role-based access controls?

A.

Integrity

B.

Availability

C.

Confidentiality

D.

Consistency

An organization is the victim of an attack in which an attacker gains unauthorized access to a computer to steal information and forward it via the internet to another attacker.

What is the purpose of this attack?

A.

Launch point

B.

Denial of availability

C.

Data export

D.

Data modification

An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.

Which device should be used?

A.

Router

B.

Access point

C.

Server

D.

Switch

What is the layer of the OSI model that creates, maintains, and disconnects process communications over the network?

A.

Data link

B.

Physical

C.

Session

D.

Transport

What is the TCP/IP layer that includes the User Datagram Protocol (UDP)?

A.

Application

B.

Network or internet

C.

Physical or network access

D.

Transport

An attacker uses malicious software to disable network resources, demanding a ransom to restore access.

Which category describes the purpose of the attack?

A.

Data modification

B.

Denial of availability

C.

Data export

D.

Launch point

After a series of attacks, an organization needs to bolster its data protection measures.

Which strategy should be used to increase data protection?

A.

Use a variable network topology

B.

Have restoration policies in place

C.

Require that passwords change weekly

D.

Implement wired equivalent privacy (WEP)

An attacker sends emails claiming that an online account has been locked. The email provides a fake link with the goal of tricking users into providing login credentials.

Which malicious attack strategy is represented in the scenario?

A.

Phishing

B.

IP address spoofing

C.

Session hijacking

D.

Man-in-the-middle attack

Which layer of the OSI model includes HTTP?

A.

Application

B.

Network

C.

Session

D.

Transport