Which component of the IT securityCIA triadis a driver for enabling data encryption?
When setting up a network, a technician needs a router that creates an access point.
Which router should be used?
What is the layer of the OSI model that creates, maintains, and disconnects process communications over the network?
A company grants users permissions based on the department in which users work.
Which type of access control is involved?
Which layer of the OSI model includes the ICMP?
An attacker issues commands to access a file on a network drive and overwrite it with new data.
What is the purpose of the attack?
What is the TCP/IP layer that includes the User Datagram Protocol (UDP)?
A developer is using shared functions for software code in order to reduce complexity, knowing that greater complexity and volume of code are harder to defend against attacks.
Which security principle is demonstrated in this scenario?