Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

Network-and-Security-Foundation Questions and Answers

Question # 6

In order to reduce the risk of insider attacks, a company assigns role-based permissions to its users.

Which network security concept does this scenario address?

A.

Authentication

B.

Accounting

C.

Availability

D.

Authorization

Full Access
Question # 7

A company wants to implement a cloud service to obtain access to virtual machines. The company wants to be able to choose the operating systems and configure each of the machines.

What is the type of cloud service model that fits the needs of this company?

A.

Function as a Service (FaaS)

B.

Infrastructure as a Service (IaaS)

C.

Platform as a Service (PaaS)

D.

Software as a Service (SaaS)

Full Access
Question # 8

A developer is using shared functions for software code in order to reduce complexity, knowing that greater complexity and volume of code are harder to defend against attacks.

Which security principle is demonstrated in this scenario?

A.

Economy of mechanism

B.

Least common mechanism

C.

Least privilege

D.

Zero-trust model

Full Access
Question # 9

A company is designing an information system and is maintaining a focus on the user experience and resulting productivity rather than on the technology itself.

What is the security principle implemented in this scenario?

A.

Least common mechanism

B.

Fail-safe

C.

Zero-trust model

D.

Human-centeredness

Full Access
Question # 10

Which layer of the TCP/IP model includes the Internet Protocol (IP)?

A.

Physical or network access

B.

Application

C.

Network or internet

D.

Transport

Full Access
Question # 11

A company is developing a data protection methodology in order to improve data protection measures.

What is a strategy that should be used?

A.

Use a variable network topology

B.

Increase wireless access point range

C.

Enhance physical resource security

D.

Implement wired equivalent privacy (WEP)

Full Access
Question # 12

What is the layer of the OSI model that creates, maintains, and disconnects process communications over the network?

A.

Data link

B.

Physical

C.

Session

D.

Transport

Full Access
Question # 13

An organization does not have controls in place to limit employee access to sensitive customer data.

What is a component of the CIA triad that is violated?

A.

Confidentiality

B.

Integrity

C.

Availability

D.

Interpretation

Full Access
Question # 14

After a series of attacks, an organization needs to bolster its data protection measures.

Which strategy should be used to increase data protection?

A.

Use a variable network topology

B.

Have restoration policies in place

C.

Require that passwords change weekly

D.

Implement wired equivalent privacy (WEP)

Full Access
Question # 15

An attacker sends emails claiming that an online account has been locked. The email provides a fake link with the goal of tricking users into providing login credentials.

Which malicious attack strategy is represented in the scenario?

A.

Phishing

B.

IP address spoofing

C.

Session hijacking

D.

Man-in-the-middle attack

Full Access
Question # 16

An organization is updating its information security policies in order to comply with thePersonal Information Protection and Electronic Documents Act (PIPEDA).

What should this organization expect to be required under this legislation?

A.

Securely dispose of personally identifiable information

B.

Compensate individuals for revenue from the sale of their information

C.

Notify individuals each time their personal information is viewed

D.

Disclose the software used to protect personal data

Full Access
Question # 17

Which scenario demonstrates a violation of the integrity component of the CIA triad?

A.

A network's domain name system server has not been fully operational for one month.

B.

An employee accidentally modified a customer account incorrectly.

C.

A company has an unacceptably high network downtime during high-traffic time periods.

D.

A company stores sensitive customer data without access controls.

Full Access
Question # 18

A host is already set up with an operating system. An administrator wants to install a hypervisor atop the operating system to allow for setting up virtual machines.

Which hypervisor should be used?

A.

Open source

B.

Proprietary

C.

Type 1

D.

Type 2

Full Access