Month End Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Network-and-Security-Foundation Exam Dumps - Network-and-Security-Foundation

Go to page:
Question # 9

An attacker uses login data from a data breach to attempt to access another web service.

Which malicious attack strategy is represented in the scenario?

A.

Brute-force attack

B.

Credential stuffing

C.

Session hijacking

D.

Social engineering

Full Access
Question # 10

A company is designing an information system and is maintaining a focus on the user experience and resulting productivity rather than on the technology itself.

What is the security principle implemented in this scenario?

A.

Least common mechanism

B.

Fail-safe

C.

Zero-trust model

D.

Human-centeredness

Full Access
Question # 11

An organization is the victim of an attack in which an attacker uses a forged employee ID card to deceive a company employee into providing sensitive information.

What is the type of cyberattack described in this scenario?

A.

Brute-force attack

B.

Man-in-the-middle attack

C.

Social engineering

D.

Pharming

Full Access
Question # 12

An organization has experienced a series of data breaches and needs to ensure that data remains protected even if intercepted.

Which security measure should be implemented?

A.

Role-based access control (RBAC)

B.

Two-factor authentication (2FA)

C.

Data encryption

D.

Patch management

Full Access
Question # 13

What is the component of the CIA triad for IT security that requires that IP packets be retransmitted if the receiving host has an invalid checksum value?

A.

Consistency

B.

Confidentiality

C.

Availability

D.

Integrity

Full Access
Question # 14

Which layer of the TCP/IP model includes the Internet Protocol (IP)?

A.

Physical or network access

B.

Application

C.

Network or internet

D.

Transport

Full Access
Question # 15

Which layer of the OSI model includes the TCP?

A.

Application

B.

Transport

C.

Session

D.

Network

Full Access
Question # 16

An attacker uses malicious software to disable network resources, demanding a ransom to restore access.

Which category describes the purpose of the attack?

A.

Data modification

B.

Denial of availability

C.

Data export

D.

Launch point

Full Access
Go to page: