Which component of the IT securityCIA triadis a driver for enabling data encryption?
Which layer of the OSI model includes the TCP?
An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.
Which device should be used?
A company’s internal messaging system is being redesigned. The authentication procedures were so cumbersome that employees were using personal email to communicate.
What is the security principle implemented in this scenario?
An attacker sends emails claiming that an online account has been locked. The email provides a fake link with the goal of tricking users into providing login credentials.
Which malicious attack strategy is represented in the scenario?
In order to reduce the risk of insider attacks, a company assigns role-based permissions to its users.
Which network security concept does this scenario address?
A company wants to use a cloud service to obtain virtual machines with pre-installed and configured software.
Which cloud service model should be used?
An organization's network has been the target of several cyberattacks.
Which strategy should the organization use for Wi-Fi hardening?
An attacker uses malicious software to disable network resources, demanding a ransom to restore access.
Which category describes the purpose of the attack?
When setting up a network, a technician needs a router that creates an access point.
Which router should be used?