Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium WGU Network-and-Security-Foundation Dumps Questions Answers

Network-and-Security-Foundation Questions and Answers

Question 1

Which layer of the OSI model includes the ICMP?

Options:

A.

Transport

B.

Session

C.

Network

D.

Application

Buy Now
Question 2

An attacker uses a list of commonly used access credentials to attempt to gain access to an online account.

Which malicious attack strategy is represented in the scenario?

Options:

A.

Phishing

B.

Dictionary attack

C.

Credential stuffing

D.

Social engineering

Question 3

Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to test DNS resolution against a host.

Which command in Linux should be used for this purpose?

Options:

A.

traceroute

B.

netstat

C.

dig

D.

ifconfig

Question 4

A company is designing an information system and is maintaining a focus on the user experience and resulting productivity rather than on the technology itself.

What is the security principle implemented in this scenario?

Options:

A.

Least common mechanism

B.

Fail-safe

C.

Zero-trust model

D.

Human-centeredness

Question 5

When setting up a network, a technician needs a router that creates an access point.

Which router should be used?

Options:

A.

Wireless router

B.

Broadband router

C.

Core router

D.

Inter-provider border router

Question 6

An organization is the victim of an attack in which an attacker gains unauthorized access to a computer to steal information and forward it via the internet to another attacker.

What is the purpose of this attack?

Options:

A.

Launch point

B.

Denial of availability

C.

Data export

D.

Data modification

Question 7

An organization's network has been the target of several cyberattacks.

Which strategy should the organization use for Wi-Fi hardening?

Options:

A.

Implement wired equivalent privacy (WEP)

B.

Configure RADIUS authentication

C.

Implement a bus topology

D.

Avoid the use of asymmetric encryption

Question 8

Which scenario demonstrates a violation of the integrity component of the CIA triad?

Options:

A.

A network's domain name system server has not been fully operational for one month.

B.

An employee accidentally modified a customer account incorrectly.

C.

A company has an unacceptably high network downtime during high-traffic time periods.

D.

A company stores sensitive customer data without access controls.

Question 9

In order to reduce the risk of insider attacks, a company assigns role-based permissions to its users.

Which network security concept does this scenario address?

Options:

A.

Authentication

B.

Accounting

C.

Availability

D.

Authorization

Question 10

In the process of setting up a Linux-based network system, a technician needs to determine if there is connectivity to a hostname.

Which command should be used?

Options:

A.

ping

B.

nslookup

C.

ifconfig

D.

dig

Question 11

Which layer of the OSI model includes the TCP?

Options:

A.

Application

B.

Transport

C.

Session

D.

Network

Question 12

An organization is the victim of an attack in which an attacker uses a forged employee ID card to deceive a company employee into providing sensitive information.

What is the type of cyberattack described in this scenario?

Options:

A.

Brute-force attack

B.

Man-in-the-middle attack

C.

Social engineering

D.

Pharming

Question 13

A computer network has software that tracks successful and unsuccessful connection attempts to the network in order to better identify attacks.

Which network security concept does this scenario address?

Options:

A.

Accounting

B.

Authentication

C.

Availability

D.

Authorization

Question 14

After recently experiencing a security breach, a company is working on improving its database security. As a part of its security governance strategies, the company is developing a database security checklist.

Which component is important to include in this checklist?

Options:

A.

Disclosing any instances of breaches of personal data

B.

Restricting physical access to locations where data is housed

C.

Developing algorithms for secure access to data

D.

Outsourcing data management to third-party vendors

Question 15

An attacker issues commands to access a file on a network drive and overwrite it with new data.

What is the purpose of the attack?

Options:

A.

Data modification

B.

Launch point

C.

Data export

D.

Denial of availability

Question 16

A company wants to implement a cloud service to obtain access to virtual machines. The company wants to be able to choose the operating systems and configure each of the machines.

What is the type of cloud service model that fits the needs of this company?

Options:

A.

Function as a Service (FaaS)

B.

Infrastructure as a Service (IaaS)

C.

Platform as a Service (PaaS)

D.

Software as a Service (SaaS)

Question 17

Which CIA triad component is a driver for enabling role-based access controls?

Options:

A.

Integrity

B.

Availability

C.

Confidentiality

D.

Consistency

Question 18

A company is ensuring that its network protocol meets encryption standards.

What is the CIA triad component targeted in the scenario?

Options:

A.

Integrity

B.

Consistency

C.

Availability

D.

Confidentiality