Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

WGU Network-and-Security-Foundation Network-and-Security-Foundation Exam Practice Test

Network-and-Security-Foundation Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

A company is specifically worried about buffer overflow attacks.

Which strategy should be used as a mitigation against this type of attack?

Options:

A.

Detect code vulnerabilities

B.

Disable caching

C.

Use server-side validation

D.

Implement intrusion protection software

Question 2

When setting up a network, a technician needs a router that creates an access point.

Which router should be used?

Options:

A.

Wireless router

B.

Broadband router

C.

Core router

D.

Inter-provider border router

Question 3

A developer is using shared functions for software code in order to reduce complexity, knowing that greater complexity and volume of code are harder to defend against attacks.

Which security principle is demonstrated in this scenario?

Options:

A.

Economy of mechanism

B.

Least common mechanism

C.

Least privilege

D.

Zero-trust model

Question 4

An attacker changes a computer's identification to appear as an authorized computer in a target network.

Which type of cyberattack is described?

Options:

A.

Pharming

B.

Man-in-the-middle attack

C.

Session hijacking

D.

IP address spoofing

Question 5

Which layer of the OSI model includes the ICMP?

Options:

A.

Transport

B.

Session

C.

Network

D.

Application

Question 6

A start-up company wants to build its computer network by starting with the base-level resources offered by a cloud service. In this way, the company won't have to buy physical hardware but canstill have complete control over operating systems and other software.

Which cloud service model should be used?

Options:

A.

Software as a Service (SaaS)

B.

Function as a Service (FaaS)

C.

Infrastructure as a Service (IaaS)

D.

Platform as a Service (PaaS)

Question 7

When setting up a network, a technician needs a router that connects computers together and connects computers to the internet.

Which router should be used?

Options:

A.

Inter-provider border router

B.

Subscriber edge router

C.

Broadband router

D.

Core router

Question 8

Which statement describes the Integrity tenet of IT security?

Options:

A.

It involves transmitting network data without any errors.

B.

It requires the encryption of sensitive data transmission.

C.

It requires that network applications be accessible to users.

D.

It involves keeping systems accessible for network users.

Question 9

After a series of attacks, an organization needs to bolster its data protection measures.

Which strategy should be used to increase data protection?

Options:

A.

Use a variable network topology

B.

Have restoration policies in place

C.

Require that passwords change weekly

D.

Implement wired equivalent privacy (WEP)

Question 10

Which scenario demonstrates a violation of the integrity component of the CIA triad?

Options:

A.

A network's domain name system server has not been fully operational for one month.

B.

An employee accidentally modified a customer account incorrectly.

C.

A company has an unacceptably high network downtime during high-traffic time periods.

D.

A company stores sensitive customer data without access controls.

Question 11

A library has a network that allows patrons to use their mobile devices to connect to the internet.

Which type of network is described?

Options:

A.

SAN

B.

MAN

C.

PAN

D.

WLAN

Question 12

A company has a legacy network in which all devices receive all messages transmitted by a central wire.

Which network topology is described?

Options:

A.

Star

B.

Point-to-point

C.

Bus

D.

Ring

Question 13

A computer network has software that tracks successful and unsuccessful connection attempts to the network in order to better identify attacks.

Which network security concept does this scenario address?

Options:

A.

Accounting

B.

Authentication

C.

Availability

D.

Authorization

Question 14

An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.

Which device should be used?

Options:

A.

Router

B.

Access point

C.

Server

D.

Switch

Question 15

Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to test DNS resolution against a host.

Which command in Linux should be used for this purpose?

Options:

A.

traceroute

B.

netstat

C.

dig

D.

ifconfig

Question 16

An attacker issues commands to access a file on a network drive and overwrite it with new data.

What is the purpose of the attack?

Options:

A.

Data modification

B.

Launch point

C.

Data export

D.

Denial of availability

Question 17

An attacker uses login data from a data breach to attempt to access another web service.

Which malicious attack strategy is represented in the scenario?

Options:

A.

Brute-force attack

B.

Credential stuffing

C.

Session hijacking

D.

Social engineering

Question 18

An attacker uses a poisoned domain name on the domain name server to navigate users to the attacker's site.

Which malicious attack strategy is represented in the scenario?

Options:

A.

Pharming

B.

Brute-force attack

C.

IP address spoofing

D.

Session hijacking