Network-and-Security-Foundation Questions and Answers
An attacker uses a poisoned domain name on the domain name server to navigate users to the attacker's site.
Which malicious attack strategy is represented in the scenario?
What is the component of the CIA triad for IT security that requires that IP packets be retransmitted if the receiving host has an invalid checksum value?
A company is ensuring that its network protocol meets encryption standards.
What is the CIA triad component targeted in the scenario?
A company is developing a data protection methodology in order to improve data protection measures.
What is a strategy that should be used?
A company wants to implement virtual machines with a focus on security and efficiency.
Which type of hypervisor fits the need described in the scenario?
A start-up company wants to build its computer network by starting with the base-level resources offered by a cloud service. In this way, the company won't have to buy physical hardware but canstill have complete control over operating systems and other software.
Which cloud service model should be used?
In order to reduce the risk of insider attacks, a company assigns role-based permissions to its users.
Which network security concept does this scenario address?
An organization has experienced a series of data breaches and needs to ensure that data remains protected even if intercepted.
Which security measure should be implemented?
When setting up a network, a technician needs a router that creates an access point.
Which router should be used?
An organization is the victim of an attack in which an attacker targets a computer to use as a tool to infect and target other computers in a larger attack.
What is the purpose of this attack?
What is the TCP/IP layer that includes the User Datagram Protocol (UDP)?
A company wants to implement a cloud service to obtain access to virtual machines. The company wants to be able to choose the operating systems and configure each of the machines.
What is the type of cloud service model that fits the needs of this company?
What is the layer of the OSI model that creates, maintains, and disconnects process communications over the network?
An attacker uses malicious software to disable network resources, demanding a ransom to restore access.
Which category describes the purpose of the attack?
A company is specifically worried about buffer overflow attacks.
Which strategy should be used as a mitigation against this type of attack?
In the process of setting up a Linux-based network system, a technician needs to determine if there is connectivity to a hostname.
Which command should be used?
A developer is using shared functions for software code in order to reduce complexity, knowing that greater complexity and volume of code are harder to defend against attacks.
Which security principle is demonstrated in this scenario?
A company has a legacy network in which all devices receive all messages transmitted by a central wire.
Which network topology is described?