Special Summer Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > WGU > Courses and Certificates > Network-and-Security-Foundation

Network-and-Security-Foundation Network-and-Security-Foundation Question and Answers

Question # 4

Which CIA triad component is a driver for enabling role-based access controls?

A.

Integrity

B.

Availability

C.

Confidentiality

D.

Consistency

Full Access
Question # 5

An attacker issues commands to access a file on a network drive and overwrite it with new data.

What is the purpose of the attack?

A.

Data modification

B.

Launch point

C.

Data export

D.

Denial of availability

Full Access
Question # 6

A company is developing a data protection methodology in order to improve data protection measures.

What is a strategy that should be used?

A.

Use a variable network topology

B.

Increase wireless access point range

C.

Enhance physical resource security

D.

Implement wired equivalent privacy (WEP)

Full Access
Question # 7

An organization has experienced rogue access points in the past and wants to take actions to mitigate this type of attack.

What should this organization do?

A.

Require complex passwords

B.

Use monitor mode scanning

C.

Use server-side validation

D.

Disallow ICMP packets on the firewall

Full Access
Question # 8

An organization is evaluating its internal network. Currently, each device is connected to two adjacent devices, one on either side.

Which type of network topology is being used?

A.

Point-to-point

B.

Bus

C.

Star

D.

Ring

Full Access
Question # 9

Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to test DNS resolution against a host.

Which command in Linux should be used for this purpose?

A.

traceroute

B.

netstat

C.

dig

D.

ifconfig

Full Access
Question # 10

An attacker changes a computer's identification to appear as an authorized computer in a target network.

Which type of cyberattack is described?

A.

Pharming

B.

Man-in-the-middle attack

C.

Session hijacking

D.

IP address spoofing

Full Access
Question # 11

An attacker uses a poisoned domain name on the domain name server to navigate users to the attacker's site.

Which malicious attack strategy is represented in the scenario?

A.

Pharming

B.

Brute-force attack

C.

IP address spoofing

D.

Session hijacking

Full Access
Question # 12

A company wants to implement virtual machines with a focus on security and efficiency.

Which type of hypervisor fits the need described in the scenario?

A.

Open source

B.

Proprietary

C.

Type 1

D.

Type 2

Full Access
Question # 13

Which scenario demonstrates a violation of the integrity component of the CIA triad?

A.

A network's domain name system server has not been fully operational for one month.

B.

An employee accidentally modified a customer account incorrectly.

C.

A company has an unacceptably high network downtime during high-traffic time periods.

D.

A company stores sensitive customer data without access controls.

Full Access
Question # 14

A library has a network that allows patrons to use their mobile devices to connect to the internet.

Which type of network is described?

A.

SAN

B.

MAN

C.

PAN

D.

WLAN

Full Access
Question # 15

What is the layer of the OSI model that creates, maintains, and disconnects process communications over the network?

A.

Data link

B.

Physical

C.

Session

D.

Transport

Full Access
Question # 16

A company is specifically worried about rogue access points.

Which strategy should be used as a mitigation against this type of attack?

A.

Decrease the wireless range

B.

Disable unnecessary services

C.

Configure switch port tracing

D.

Monitor normal traffic patterns

Full Access
Question # 17

A company wants to use a cloud service to obtain virtual machines with pre-installed and configured software.

Which cloud service model should be used?

A.

Software as a Service (SaaS)

B.

Infrastructure as a Service (IaaS)

C.

Platform as a Service (PaaS)

D.

Function as a Service (FaaS)

Full Access
Question # 18

An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.

Which device should be used?

A.

Router

B.

Access point

C.

Server

D.

Switch

Full Access