An organization's network has been the target of several cyberattacks.
Which strategy should the organization use for Wi-Fi hardening?
A company wants to use a cloud service to obtain virtual machines with pre-installed and configured software.
Which cloud service model should be used?
A computer network has software that tracks successful and unsuccessful connection attempts to the network in order to better identify attacks.
Which network security concept does this scenario address?
An attacker uses a network device to take over an existing connection between two network computers.
Which malicious attack strategy is represented in the scenario?
A person is troubleshooting a network issue and needs to see a list of all active network connections.
Which Linux command should be used?
When setting up a network, a technician needs a router that connects computers together and connects computers to the internet.
Which router should be used?
A company grants users permissions based on the department in which users work.
Which type of access control is involved?
A company is ensuring that its network protocol meets encryption standards.
What is the CIA triad component targeted in the scenario?
A person is troubleshooting a network issue and needs to see details about network adapters and their settings.
Which Windows command should be used?
Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to test DNS resolution against a host.
Which command in Linux should be used for this purpose?
An organization is updating its information security policies in order to comply with thePersonal Information Protection and Electronic Documents Act (PIPEDA).
What should this organization expect to be required under this legislation?
An attacker uses a list of commonly used access credentials to attempt to gain access to an online account.
Which malicious attack strategy is represented in the scenario?
An attacker changes a computer's identification to appear as an authorized computer in a target network.
Which type of cyberattack is described?