verified answers
.
An organization is the victim of an attack in which an attacker uses a program to
take control of a connection by pretending to be each end of the
connection.What is the type of cyberattack described in this scenario? Ans✓✓✓-
session hijacking
A company is updating devices it provides employees to ensure that employees
has consistent network access. What is the CIA TRIAD component targeted?
Ans✓✓✓-Availability
A company is updating the devices it provides to employees to ensure that each
employee has consistent network access.What is the CIA triad component
targeted in the scenario? Ans✓✓✓-availibity
A company is worried about DDOS attacks Ans✓✓✓-Monitor normal traffic
patterns
A company needs to maximize the number of virtual machines that can run on
each host.Which hypervisor should be used? Ans✓✓✓-dk
A company uses cloud service to manage its IT resources. The underlying
hardware resources are shared by other companies as well.What is the cloud
deployment model described in the scenario? Ans✓✓✓-public
, A company uses hash value comparisons to determine if the data in a database
has changed. What is the CIA TRIAD component targeted? Ans✓✓✓-Integrity
A company uses hash value comparisons to determine if the data in a database
has changed.What is the CIA triad component targeted in the scenario?
Ans✓✓✓-integrity
A data breach exposed usernames and passwords to customer accounts of an
online retailer. An attacker uses the exposed data to attempt to access accounts
of another online retailer.Which malicious attack strategy is represented in the
scenario? Ans✓✓✓-credntial stuffing
A developer has an existing computer with an operating system. The developer
wants to use a hypervisor to have access to several virtual machines for a specific
project.Which form of hypervisor fits the need described in the scenario?
Ans✓✓✓-dk
A firewall that analyzes network traffic considering each packet and how groups
of packets are used. Ans✓✓✓-Context based
A firewall that analyzes packets and how packets are grouped together.
Ans✓✓✓-Context based
A hacker acts as an information system security professional who is hired to
perform penetration testing.Which term describes the given hacker? Ans✓✓✓-
white hat