Which security principle requires more than one person is required to perform a critical task?
What describes the concept of data consistently and readily being accessible for legitimate users?
Availability is one of the three pillars of the CIA triad, a model that defines the principles of information security. Availability describes the concept of data consistently and readily being accessible for legitimate users. Availability ensures that the network and systems are operational and resilient to disruptions, such as denial-of-service attacks, hardware failures, or natural disasters. Availability also involves maintaining backup and recovery procedures, load balancing, and redundancy mechanisms.Reference:
200-201 CBROPS - Cisco, Exam Topics, 1.0 Security Concepts, 1.1 Explain the CIA triad
Refer to the exhibit.
Which kind of attack method is depicted in this string?
The image shows a piece of code within a bordered rectangular area.
It is a string of HTML code that appears to be an example of an attack, specifically ''<IMG SRC=j%41vascript:alert('attack')>''.
The code suggests an attempt to execute JavaScript within an image source attribute, indicative of a cross-site scripting attack.
What is personally identifiable information that must be safeguarded from unauthorized access?
Personally Identifiable Information (PII) refers to any data that can be used to identify a specific individual. Safeguarding PII is critical to protect individuals' privacy and prevent identity theft. A driver's license number (B) is considered PII because it is unique to an individual and can be used to confirm their identity. Other examples of PII include social security numbers, passport numbers, and financial account numbers. It is important to protect such information from unauthorized access to maintain personal privacy and security.
What is the communication channel established from a compromised machine back to the attacker?
The communication channel established from a compromised machine back to the attacker is known as a command and control (C2) channel. This channel allows attackers to maintain communication with the compromised system, issue commands, and potentially exfiltrate data. The C2 channel can be established using various protocols and methods to evade detection and maintain persistence.