Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

WGU Network-and-Security-Foundation Network-and-Security-Foundation Exam Practice Test

Network-and-Security-Foundation Questions and Answers

Question 1

An attacker uses malicious software to disable network resources, demanding a ransom to restore access.

Which category describes the purpose of the attack?

Options:

A.

Data modification

B.

Denial of availability

C.

Data export

D.

Launch point

Question 2

A company is developing a data protection methodology in order to improve data protection measures.

What is a strategy that should be used?

Options:

A.

Use a variable network topology

B.

Increase wireless access point range

C.

Enhance physical resource security

D.

Implement wired equivalent privacy (WEP)

Question 3

An organization is the victim of an attack in which an attacker gains unauthorized access to a computer to steal information and forward it via the internet to another attacker.

What is the purpose of this attack?

Options:

A.

Launch point

B.

Denial of availability

C.

Data export

D.

Data modification

Question 4

An organization is the victim of an attack in which an attacker uses a forged employee ID card to deceive a company employee into providing sensitive information.

What is the type of cyberattack described in this scenario?

Options:

A.

Brute-force attack

B.

Man-in-the-middle attack

C.

Social engineering

D.

Pharming

Question 5

A company wants to implement virtual machines with a focus on security and efficiency.

Which type of hypervisor fits the need described in the scenario?

Options:

A.

Open source

B.

Proprietary

C.

Type 1

D.

Type 2

Question 6

An organization is updating its information security policies in order to comply with thePersonal Information Protection and Electronic Documents Act (PIPEDA).

What should this organization expect to be required under this legislation?

Options:

A.

Securely dispose of personally identifiable information

B.

Compensate individuals for revenue from the sale of their information

C.

Notify individuals each time their personal information is viewed

D.

Disclose the software used to protect personal data

Question 7

A person is troubleshooting a network issue and needs to see details about network adapters and their settings.

Which Windows command should be used?

Options:

A.

ipconfig

B.

traceroute

C.

nslookup

D.

netstat

Question 8

Which layer of the OSI model includes HTTP?

Options:

A.

Application

B.

Network

C.

Session

D.

Transport

Question 9

Which component of the IT securityCIA triadis a driver for enabling data encryption?

Options:

A.

Application

B.

Integrity

C.

Confidentiality

D.

Availability

Question 10

An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.

Which device should be used?

Options:

A.

Router

B.

Access point

C.

Server

D.

Switch

Question 11

An organization is evaluating its internal network. Currently, each device is connected to two adjacent devices, one on either side.

Which type of network topology is being used?

Options:

A.

Point-to-point

B.

Bus

C.

Star

D.

Ring

Question 12

A host is already set up with an operating system. An administrator wants to install a hypervisor atop the operating system to allow for setting up virtual machines.

Which hypervisor should be used?

Options:

A.

Open source

B.

Proprietary

C.

Type 1

D.

Type 2

Question 13

An organization's network has been the target of several cyberattacks.

Which strategy should the organization use for Wi-Fi hardening?

Options:

A.

Implement wired equivalent privacy (WEP)

B.

Configure RADIUS authentication

C.

Implement a bus topology

D.

Avoid the use of asymmetric encryption

Question 14

After recently experiencing a security breach, a company is working on improving its database security. As a part of its security governance strategies, the company is developing a database security checklist.

Which component is important to include in this checklist?

Options:

A.

Disclosing any instances of breaches of personal data

B.

Restricting physical access to locations where data is housed

C.

Developing algorithms for secure access to data

D.

Outsourcing data management to third-party vendors

Question 15

A company has a legacy network in which all devices receive all messages transmitted by a central wire.

Which network topology is described?

Options:

A.

Star

B.

Point-to-point

C.

Bus

D.

Ring

Question 16

A company is specifically worried about buffer overflow attacks.

Which strategy should be used as a mitigation against this type of attack?

Options:

A.

Detect code vulnerabilities

B.

Disable caching

C.

Use server-side validation

D.

Implement intrusion protection software

Question 17

Which scenario demonstrates a violation of the integrity component of the CIA triad?

Options:

A.

A network's domain name system server has not been fully operational for one month.

B.

An employee accidentally modified a customer account incorrectly.

C.

A company has an unacceptably high network downtime during high-traffic time periods.

D.

A company stores sensitive customer data without access controls.

Question 18

An organization is the victim of an attack in which an attacker targets a computer to use as a tool to infect and target other computers in a larger attack.

What is the purpose of this attack?

Options:

A.

Denial of availability

B.

Data export

C.

Data modification

D.

Launch point