An organization's network has been the target of several cyberattacks.
Which strategy should the organization use for Wi-Fi hardening?
A company is specifically worried about buffer overflow attacks.
Which strategy should be used as a mitigation against this type of attack?
A company has a legacy network in which all devices receive all messages transmitted by a central wire.
Which network topology is described?
What is an IT infrastructure security tenet of the CIA triad that counters passive attacks that aim to steal or intercept data?
An attacker uses a network device to take over an existing connection between two network computers.
Which malicious attack strategy is represented in the scenario?
An organization has experienced a series of data breaches and needs to ensure that data remains protected even if intercepted.
Which security measure should be implemented?
A developer is using shared functions for software code in order to reduce complexity, knowing that greater complexity and volume of code are harder to defend against attacks.
Which security principle is demonstrated in this scenario?
A company wants to implement virtual machines with a focus on security and efficiency.
Which type of hypervisor fits the need described in the scenario?
After a series of attacks, an organization needs to bolster its data protection measures.
Which strategy should be used to increase data protection?
Access to a company's information system requires a user to be within a valid geographic location and to enter a valid username and password.
Which concept does this scenario demonstrate?
An attacker changes a computer's identification to appear as an authorized computer in a target network.
Which type of cyberattack is described?
A company is developing a disaster recovery plan for its internal network.
What is the CIA triad component targeted in the scenario?