Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the WGU Courses and Certificates Network-and-Security-Foundation Questions and answers with ValidTests

Exam Network-and-Security-Foundation All Questions
Exam Network-and-Security-Foundation Premium Access

View all detail and faqs for the Network-and-Security-Foundation exam

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

An organization has experienced a series of data breaches and needs to ensure that data remains protected even if intercepted.

Which security measure should be implemented?

Options:

A.

Role-based access control (RBAC)

B.

Two-factor authentication (2FA)

C.

Data encryption

D.

Patch management

Expert Solution
Questions # 2:

Access to a company's information system requires a user to be within a valid geographic location and to enter a valid username and password.

Which concept does this scenario demonstrate?

Options:

A.

Certificate verification

B.

Multifactor authentication

C.

User-based accounting

D.

Single sign-on

Expert Solution
Questions # 3:

Which layer of the TCP/IP model includes the Internet Protocol (IP)?

Options:

A.

Physical or network access

B.

Application

C.

Network or internet

D.

Transport

Expert Solution
Questions # 4:

An organization is evaluating its internal network. Currently, each device is connected to two adjacent devices, one on either side.

Which type of network topology is being used?

Options:

A.

Point-to-point

B.

Bus

C.

Star

D.

Ring

Expert Solution
Questions # 5:

Which layer of the OSI model includes the TCP?

Options:

A.

Application

B.

Transport

C.

Session

D.

Network

Expert Solution
Questions # 6:

Which statement describes the Integrity tenet of IT security?

Options:

A.

It involves transmitting network data without any errors.

B.

It requires the encryption of sensitive data transmission.

C.

It requires that network applications be accessible to users.

D.

It involves keeping systems accessible for network users.

Expert Solution
Questions # 7:

A host is already set up with an operating system. An administrator wants to install a hypervisor atop the operating system to allow for setting up virtual machines.

Which hypervisor should be used?

Options:

A.

Open source

B.

Proprietary

C.

Type 1

D.

Type 2

Expert Solution
Questions # 8:

An organization's network has been the target of several cyberattacks.

Which strategy should the organization use for Wi-Fi hardening?

Options:

A.

Trust local hosts by default

B.

Disable ESSID broadcasting

C.

Add more access points

D.

Implement wired equivalent privacy (WEP)

Expert Solution
Questions # 9:

A company is specifically worried about rogue access points.

Which strategy should be used as a mitigation against this type of attack?

Options:

A.

Decrease the wireless range

B.

Disable unnecessary services

C.

Configure switch port tracing

D.

Monitor normal traffic patterns

Expert Solution
Questions # 10:

An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.

Which device should be used?

Options:

A.

Router

B.

Access point

C.

Server

D.

Switch

Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions