A company’s internal messaging system is being redesigned. The authentication procedures were so
cumbersome that employees were using personal email to communicate.
What is the security principle implemented in this scenario?
An organization does not have controls in place to limit employee access to sensitive customer data.
What is a component of the CIA triad that is violated?
In the process of setting up a Linux-based network system, a technician needs to determine if there is
connectivity to a hostname.
Which command should be used?
An organization is the victim of an attack in which an attacker gains unauthorized access to a computer to
steal information and forward it via the internet to another attacker.
What is the purpose of this attack?