View all detail and faqs for the Network-and-Security-Foundation exam
A developer is using shared functions for software code in order to reduce complexity, knowing that greater complexity and volume of code are harder to defend against attacks.
Which security principle is demonstrated in this scenario?
Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to test DNS resolution against a host.
Which command in Linux should be used for this purpose?
An organization is the victim of an attack in which an attacker intercepts messages between two parties before transferring them to the correct destination.
What is the type of cyberattack described in this scenario?
After recently experiencing a security breach, a company is working on improving its database security. As a part of its security governance strategies, the company is developing a database security checklist.
Which component is important to include in this checklist?
An attacker uses a network device to take over an existing connection between two network computers.
Which malicious attack strategy is represented in the scenario?
Which layer of the OSI model includes HTTP?
A computer network has software that tracks successful and unsuccessful connection attempts to the network in order to better identify attacks.
Which network security concept does this scenario address?
When setting up a network, a technician needs a router that creates an access point.
Which router should be used?