Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the WGU Courses and Certificates Network-and-Security-Foundation Questions and answers with ValidTests

Exam Network-and-Security-Foundation All Questions
Exam Network-and-Security-Foundation Premium Access

View all detail and faqs for the Network-and-Security-Foundation exam

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

A developer is using shared functions for software code in order to reduce complexity, knowing that greater complexity and volume of code are harder to defend against attacks.

Which security principle is demonstrated in this scenario?

Options:

A.

Economy of mechanism

B.

Least common mechanism

C.

Least privilege

D.

Zero-trust model

Expert Solution
Questions # 12:

Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to test DNS resolution against a host.

Which command in Linux should be used for this purpose?

Options:

A.

traceroute

B.

netstat

C.

dig

D.

ifconfig

Expert Solution
Questions # 13:

An organization is the victim of an attack in which an attacker intercepts messages between two parties before transferring them to the correct destination.

What is the type of cyberattack described in this scenario?

Options:

A.

Credential stuffing

B.

Social engineering

C.

Pharming

D.

Man-in-the-middle attack

Expert Solution
Questions # 14:

After recently experiencing a security breach, a company is working on improving its database security. As a part of its security governance strategies, the company is developing a database security checklist.

Which component is important to include in this checklist?

Options:

A.

Disclosing any instances of breaches of personal data

B.

Restricting physical access to locations where data is housed

C.

Developing algorithms for secure access to data

D.

Outsourcing data management to third-party vendors

Expert Solution
Questions # 15:

An attacker uses a network device to take over an existing connection between two network computers.

Which malicious attack strategy is represented in the scenario?

Options:

A.

Dictionary attack

B.

Social engineering

C.

Session hijacking

D.

IP address spoofing

Expert Solution
Questions # 16:

Which layer of the OSI model includes HTTP?

Options:

A.

Application

B.

Network

C.

Session

D.

Transport

Expert Solution
Questions # 17:

A computer network has software that tracks successful and unsuccessful connection attempts to the network in order to better identify attacks.

Which network security concept does this scenario address?

Options:

A.

Accounting

B.

Authentication

C.

Availability

D.

Authorization

Expert Solution
Questions # 18:

When setting up a network, a technician needs a router that creates an access point.

Which router should be used?

Options:

A.

Wireless router

B.

Broadband router

C.

Core router

D.

Inter-provider border router

Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions