An organization is the victim of an attack in which an attacker uses a forged employee ID card to deceive a company employee into providing sensitive information.
What is the type of cyberattack described in this scenario?
An attacker uses a poisoned domain name on the domain name server to navigate users to the attacker's site.
Which malicious attack strategy is represented in the scenario?
After a series of attacks, an organization needs to bolster its data protection measures.
Which strategy should be used to increase data protection?
A company is specifically worried about buffer overflow attacks.
Which strategy should be used as a mitigation against this type of attack?
An organization is updating its information security policies in order to comply with thePersonal Information Protection and Electronic Documents Act (PIPEDA).
What should this organization expect to be required under this legislation?
A host is already set up with an operating system. An administrator wants to install a hypervisor atop the operating system to allow for setting up virtual machines.
Which hypervisor should be used?
A company grants users permissions based on the department in which users work.
Which type of access control is involved?
An attacker uses login data from a data breach to attempt to access another web service.
Which malicious attack strategy is represented in the scenario?