An organization is the victim of an attack in which an attacker uses a forged employee ID card to deceive a company employee into providing sensitive information.
What is the type of cyberattack described in this scenario?
An attacker uses a network device to take over an existing connection between two network computers.
Which malicious attack strategy is represented in the scenario?
A company wants to use a cloud service to obtain virtual machines with pre-installed and configured software.
Which cloud service model should be used?
An attacker issues commands to access a file on a network drive and overwrite it with new data.
What is the purpose of the attack?
A company is developing a data protection methodology in order to improve data protection measures.
What is a strategy that should be used?
An organization is updating its information security policies in order to comply with thePersonal Information Protection and Electronic Documents Act (PIPEDA).
What should this organization expect to be required under this legislation?
An organization is the victim of an attack in which an attacker intercepts messages between two parties before transferring them to the correct destination.
What is the type of cyberattack described in this scenario?
An attacker uses malicious software to disable network resources, demanding a ransom to restore access.
Which category describes the purpose of the attack?