In order to reduce the risk of insider attacks, a company assigns role-based permissions to its users.
Which network security concept does this scenario address?
A company wants to implement a cloud service to obtain access to virtual machines. The company wants to be able to choose the operating systems and configure each of the machines.
What is the type of cloud service model that fits the needs of this company?
A developer is using shared functions for software code in order to reduce complexity, knowing that greater complexity and volume of code are harder to defend against attacks.
Which security principle is demonstrated in this scenario?
A company is designing an information system and is maintaining a focus on the user experience and resulting productivity rather than on the technology itself.
What is the security principle implemented in this scenario?
A company is developing a data protection methodology in order to improve data protection measures.
What is a strategy that should be used?
What is the layer of the OSI model that creates, maintains, and disconnects process communications over the network?
An organization does not have controls in place to limit employee access to sensitive customer data.
What is a component of the CIA triad that is violated?
After a series of attacks, an organization needs to bolster its data protection measures.
Which strategy should be used to increase data protection?
An attacker sends emails claiming that an online account has been locked. The email provides a fake link with the goal of tricking users into providing login credentials.
Which malicious attack strategy is represented in the scenario?
An organization is updating its information security policies in order to comply with thePersonal Information Protection and Electronic Documents Act (PIPEDA).
What should this organization expect to be required under this legislation?
Which scenario demonstrates a violation of the integrity component of the CIA triad?
A host is already set up with an operating system. An administrator wants to install a hypervisor atop the operating system to allow for setting up virtual machines.
Which hypervisor should be used?