Which layer of the TCP/IP model includes the Internet Protocol (IP)?
The Network or Internet layer of the TCP/IP model is responsible for addressing, routing, and delivering packets across networks. The Internet Protocol (IP) operates at this layer, ensuring that data is correctly routed from the source to the destination.
Physical or network access layer deals with hardware transmission (e.g., Ethernet, Wi-Fi).
Application layer includes end-user services (e.g., HTTP, FTP).
Transport layer manages data flow using protocols like TCP and UDP but does not handle IP addressing.
An organization is the victim of an attack in which an attacker uses a forged employee ID card to deceive a company employee into providing sensitive information.
What is the type of cyberattack described in this scenario?
Social engineering involves manipulating people into divulging confidential information, often by impersonation, deception, or psychological tactics. Using a forged ID card to gain trust and extract sensitive information is a classic example of social engineering.
Brute-force attack attempts to guess passwords through automated methods.
Man-in-the-middle attack intercepts communication but does not rely on deception.
Pharming tricks users into visiting fraudulent websites but does not involve impersonation.
A company wants to use a cloud service to obtain virtual machines with pre-installed and configured software.
Which cloud service model should be used?
Platform as a Service (PaaS) provides a pre-configured computing environment that includes an operating system, runtime, and development tools, making it ideal for developers who want a ready-to-use platform. Examples include Google App Engine and Microsoft Azure App Services.
SaaS provides fully hosted applications, not just pre-configured virtual machines.
IaaS provides infrastructure without pre-installed software.
FaaS executes specific functions without persistent infrastructure.
A person is troubleshooting a network issue and needs to see a list of all active network connections.
Which Linux command should be used?
The netstat command in Linux displays active network connections, listening ports, and network statistics. It is useful for diagnosing network issues and identifying open connections.
nslookup is for DNS queries.
dig provides DNS information, not network connection status.
ifconfig shows network interface details but does not list active connections.
A company's internal messaging system is being redesigned. The authentication procedures were so cumbersome that employees were using personal email to communicate.
What is the security principle implemented in this scenario?
Psychological acceptability states that security measures should be user-friendly and not overly burdensome. If security controls are too complex, users may bypass them, leading to weaker security. In this case, employees used personal email because authentication procedures were too cumbersome.
Zero-trust model enforces strict access control, not usability.
Least common mechanism limits shared resources.
Fail-safe ensures secure failure handling, not usability.
Myra
11 days agoWilbert
18 days agoChanel
25 days agoShonda
1 month agoJudy
1 month agoWillard
2 months agoJannette
2 months agoSue
2 months agoLamonica
2 months agoLaquanda
3 months agoLarae
3 months agoTheron
3 months agoJestine
3 months agoGlynda
4 months agoLucille
4 months agoErick
4 months agoEttie
4 months agoNathalie
5 months agoAlline
5 months agoAvery
5 months ago