A person is troubleshooting a network issue and needs to see a list of all active network connections.
Which Linux command should be used?
The netstat command in Linux displays active network connections, listening ports, and network statistics. It is useful for diagnosing network issues and identifying open connections.
nslookup is for DNS queries.
dig provides DNS information, not network connection status.
ifconfig shows network interface details but does not list active connections.
A company's internal messaging system is being redesigned. The authentication procedures were so cumbersome that employees were using personal email to communicate.
What is the security principle implemented in this scenario?
Psychological acceptability states that security measures should be user-friendly and not overly burdensome. If security controls are too complex, users may bypass them, leading to weaker security. In this case, employees used personal email because authentication procedures were too cumbersome.
Zero-trust model enforces strict access control, not usability.
Least common mechanism limits shared resources.
Fail-safe ensures secure failure handling, not usability.
An organization is the victim of an attack in which an attacker uses a forged employee ID card to deceive a company employee into providing sensitive information.
What is the type of cyberattack described in this scenario?
Social engineering involves manipulating people into divulging confidential information, often by impersonation, deception, or psychological tactics. Using a forged ID card to gain trust and extract sensitive information is a classic example of social engineering.
Brute-force attack attempts to guess passwords through automated methods.
Man-in-the-middle attack intercepts communication but does not rely on deception.
Pharming tricks users into visiting fraudulent websites but does not involve impersonation.
In the process of setting up a Linux-based network system, a technician needs to determine if there is connectivity to a hostname.
Which command should be used?
The ping command in Linux is used to check network connectivity to a specific hostname or IP address. It sends ICMP Echo Request packets and measures response times.
nslookup is used for DNS lookups, not connectivity testing.
ifconfig displays network interface configurations but does not test connectivity.
dig is used for detailed DNS queries.
Which layer of the TCP/IP model includes the Internet Protocol (IP)?
The Network or Internet layer of the TCP/IP model is responsible for addressing, routing, and delivering packets across networks. The Internet Protocol (IP) operates at this layer, ensuring that data is correctly routed from the source to the destination.
Physical or network access layer deals with hardware transmission (e.g., Ethernet, Wi-Fi).
Application layer includes end-user services (e.g., HTTP, FTP).
Transport layer manages data flow using protocols like TCP and UDP but does not handle IP addressing.
Willard
6 days agoJannette
13 days agoSue
20 days agoLamonica
28 days agoLaquanda
1 month agoLarae
1 month agoTheron
2 months agoJestine
2 months agoGlynda
2 months agoLucille
2 months agoErick
3 months agoEttie
3 months agoNathalie
3 months agoAlline
3 months agoAvery
4 months ago