Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the WGU Courses and Certificates Network-and-Security-Foundation Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam Network-and-Security-Foundation Premium Access

View all detail and faqs for the Network-and-Security-Foundation exam


475 Students Passed

87% Average Score

96% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which layer of the OSI model includes the TCP?

Options:

A.

Application

B.

Transport

C.

Session

D.

Network

Questions # 2:

A company is specifically worried about rogue access points.

Which strategy should be used as a mitigation against this type of attack?

Options:

A.

Decrease the wireless range

B.

Disable unnecessary services

C.

Configure switch port tracing

D.

Monitor normal traffic patterns

Questions # 3:

A company wants to use a cloud service to obtain virtual machines with pre-installed and configured software.

Which cloud service model should be used?

Options:

A.

Software as a Service (SaaS)

B.

Infrastructure as a Service (IaaS)

C.

Platform as a Service (PaaS)

D.

Function as a Service (FaaS)

Questions # 4:

An attacker changes a computer's identification to appear as an authorized computer in a target network.

Which type of cyberattack is described?

Options:

A.

Pharming

B.

Man-in-the-middle attack

C.

Session hijacking

D.

IP address spoofing

Questions # 5:

An attacker uses a network device to take over an existing connection between two network computers.

Which malicious attack strategy is represented in the scenario?

Options:

A.

Dictionary attack

B.

Social engineering

C.

Session hijacking

D.

IP address spoofing

Questions # 6:

What is a CIA triad component that involves keeping systems accessible for network users?

Options:

A.

Availability

B.

Innovation

C.

Integrity

D.

Confidentiality

Questions # 7:

An attacker issues commands to access a file on a network drive and overwrite it with new data.

What is the purpose of the attack?

Options:

A.

Data modification

B.

Launch point

C.

Data export

D.

Denial of availability

Questions # 8:

An organization is the victim of an attack in which an attacker uses a forged employee ID card to deceive a company employee into providing sensitive information.

What is the type of cyberattack described in this scenario?

Options:

A.

Brute-force attack

B.

Man-in-the-middle attack

C.

Social engineering

D.

Pharming

Questions # 9:

An attacker uses a poisoned domain name on the domain name server to navigate users to the attacker's site.

Which malicious attack strategy is represented in the scenario?

Options:

A.

Pharming

B.

Brute-force attack

C.

IP address spoofing

D.

Session hijacking

Questions # 10:

A developer is using shared functions for software code in order to reduce complexity, knowing that greater complexity and volume of code are harder to defend against attacks.

Which security principle is demonstrated in this scenario?

Options:

A.

Economy of mechanism

B.

Least common mechanism

C.

Least privilege

D.

Zero-trust model

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.