View all detail and faqs for the Network-and-Security-Foundation exam
An organization has experienced a series of data breaches and needs to ensure that data remains protected even if intercepted.
Which security measure should be implemented?
Access to a company's information system requires a user to be within a valid geographic location and to enter a valid username and password.
Which concept does this scenario demonstrate?
Which layer of the TCP/IP model includes the Internet Protocol (IP)?
An organization is evaluating its internal network. Currently, each device is connected to two adjacent devices, one on either side.
Which type of network topology is being used?
Which layer of the OSI model includes the TCP?
Which statement describes the Integrity tenet of IT security?
A host is already set up with an operating system. An administrator wants to install a hypervisor atop the operating system to allow for setting up virtual machines.
Which hypervisor should be used?
An organization's network has been the target of several cyberattacks.
Which strategy should the organization use for Wi-Fi hardening?
A company is specifically worried about rogue access points.
Which strategy should be used as a mitigation against this type of attack?
An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.
Which device should be used?