Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Network-and-Security-Foundation Exam Dumps - Network-and-Security-Foundation

Go to page:
Question # 9

An organization is the victim of an attack in which an attacker uses a forged employee ID card to deceive a company employee into providing sensitive information.

What is the type of cyberattack described in this scenario?

A.

Brute-force attack

B.

Man-in-the-middle attack

C.

Social engineering

D.

Pharming

Full Access
Question # 10

An attacker uses a network device to take over an existing connection between two network computers.

Which malicious attack strategy is represented in the scenario?

A.

Dictionary attack

B.

Social engineering

C.

Session hijacking

D.

IP address spoofing

Full Access
Question # 11

A company wants to use a cloud service to obtain virtual machines with pre-installed and configured software.

Which cloud service model should be used?

A.

Software as a Service (SaaS)

B.

Infrastructure as a Service (IaaS)

C.

Platform as a Service (PaaS)

D.

Function as a Service (FaaS)

Full Access
Question # 12

An attacker issues commands to access a file on a network drive and overwrite it with new data.

What is the purpose of the attack?

A.

Data modification

B.

Launch point

C.

Data export

D.

Denial of availability

Full Access
Question # 13

A company is developing a data protection methodology in order to improve data protection measures.

What is a strategy that should be used?

A.

Use a variable network topology

B.

Increase wireless access point range

C.

Enhance physical resource security

D.

Implement wired equivalent privacy (WEP)

Full Access
Question # 14

An organization is updating its information security policies in order to comply with thePersonal Information Protection and Electronic Documents Act (PIPEDA).

What should this organization expect to be required under this legislation?

A.

Securely dispose of personally identifiable information

B.

Compensate individuals for revenue from the sale of their information

C.

Notify individuals each time their personal information is viewed

D.

Disclose the software used to protect personal data

Full Access
Question # 15

An organization is the victim of an attack in which an attacker intercepts messages between two parties before transferring them to the correct destination.

What is the type of cyberattack described in this scenario?

A.

Credential stuffing

B.

Social engineering

C.

Pharming

D.

Man-in-the-middle attack

Full Access
Question # 16

An attacker uses malicious software to disable network resources, demanding a ransom to restore access.

Which category describes the purpose of the attack?

A.

Data modification

B.

Denial of availability

C.

Data export

D.

Launch point

Full Access
Go to page: