Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

WGU Network-and-Security-Foundation Dumps

Network-and-Security-Foundation Questions and Answers

Question 1

An attacker uses a poisoned domain name on the domain name server to navigate users to the attacker's site.

Which malicious attack strategy is represented in the scenario?

Options:

A.

Pharming

B.

Brute-force attack

C.

IP address spoofing

D.

Session hijacking

Question 2

What is the component of the CIA triad for IT security that requires that IP packets be retransmitted if the receiving host has an invalid checksum value?

Options:

A.

Consistency

B.

Confidentiality

C.

Availability

D.

Integrity

Question 3

A company is ensuring that its network protocol meets encryption standards.

What is the CIA triad component targeted in the scenario?

Options:

A.

Integrity

B.

Consistency

C.

Availability

D.

Confidentiality

Question 4

A company is developing a data protection methodology in order to improve data protection measures.

What is a strategy that should be used?

Options:

A.

Use a variable network topology

B.

Increase wireless access point range

C.

Enhance physical resource security

D.

Implement wired equivalent privacy (WEP)

Question 5

A company wants to implement virtual machines with a focus on security and efficiency.

Which type of hypervisor fits the need described in the scenario?

Options:

A.

Open source

B.

Proprietary

C.

Type 1

D.

Type 2

Question 6

A start-up company wants to build its computer network by starting with the base-level resources offered by a cloud service. In this way, the company won't have to buy physical hardware but canstill have complete control over operating systems and other software.

Which cloud service model should be used?

Options:

A.

Software as a Service (SaaS)

B.

Function as a Service (FaaS)

C.

Infrastructure as a Service (IaaS)

D.

Platform as a Service (PaaS)

Question 7

In order to reduce the risk of insider attacks, a company assigns role-based permissions to its users.

Which network security concept does this scenario address?

Options:

A.

Authentication

B.

Accounting

C.

Availability

D.

Authorization

Question 8

An organization has experienced a series of data breaches and needs to ensure that data remains protected even if intercepted.

Which security measure should be implemented?

Options:

A.

Role-based access control (RBAC)

B.

Two-factor authentication (2FA)

C.

Data encryption

D.

Patch management

Question 9

When setting up a network, a technician needs a router that creates an access point.

Which router should be used?

Options:

A.

Wireless router

B.

Broadband router

C.

Core router

D.

Inter-provider border router

Question 10

An organization is the victim of an attack in which an attacker targets a computer to use as a tool to infect and target other computers in a larger attack.

What is the purpose of this attack?

Options:

A.

Denial of availability

B.

Data export

C.

Data modification

D.

Launch point

Question 11

What is the TCP/IP layer that includes the User Datagram Protocol (UDP)?

Options:

A.

Application

B.

Network or internet

C.

Physical or network access

D.

Transport

Question 12

A company wants to implement a cloud service to obtain access to virtual machines. The company wants to be able to choose the operating systems and configure each of the machines.

What is the type of cloud service model that fits the needs of this company?

Options:

A.

Function as a Service (FaaS)

B.

Infrastructure as a Service (IaaS)

C.

Platform as a Service (PaaS)

D.

Software as a Service (SaaS)

Question 13

What is the layer of the OSI model that creates, maintains, and disconnects process communications over the network?

Options:

A.

Data link

B.

Physical

C.

Session

D.

Transport

Question 14

An attacker uses malicious software to disable network resources, demanding a ransom to restore access.

Which category describes the purpose of the attack?

Options:

A.

Data modification

B.

Denial of availability

C.

Data export

D.

Launch point

Question 15

A company is specifically worried about buffer overflow attacks.

Which strategy should be used as a mitigation against this type of attack?

Options:

A.

Detect code vulnerabilities

B.

Disable caching

C.

Use server-side validation

D.

Implement intrusion protection software

Question 16

In the process of setting up a Linux-based network system, a technician needs to determine if there is connectivity to a hostname.

Which command should be used?

Options:

A.

ping

B.

nslookup

C.

ifconfig

D.

dig

Question 17

A developer is using shared functions for software code in order to reduce complexity, knowing that greater complexity and volume of code are harder to defend against attacks.

Which security principle is demonstrated in this scenario?

Options:

A.

Economy of mechanism

B.

Least common mechanism

C.

Least privilege

D.

Zero-trust model

Question 18

A company has a legacy network in which all devices receive all messages transmitted by a central wire.

Which network topology is described?

Options:

A.

Star

B.

Point-to-point

C.

Bus

D.

Ring

Page: 1 / 6
Total 62 questions