WGU Related Exams
Network-and-Security-Foundation Exam

In order to reduce the risk of insider attacks, a company assigns role-based permissions to its users.
Which network security concept does this scenario address?
A company is designing an information system and is maintaining a focus on the user experience and resulting productivity rather than on the technology itself.
What is the security principle implemented in this scenario?
An attacker issues commands to access a file on a network drive and overwrite it with new data.
What is the purpose of the attack?