Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

Network-and-Security-Foundation Exam Dumps - WGU Courses and Certificates Questions and Answers

Question # 14

What is the component of the CIA triad for IT security that requires that IP packets be retransmitted if the receiving host has an invalid checksum value?

Options:

A.

Consistency

B.

Confidentiality

C.

Availability

D.

Integrity

Buy Now
Question # 15

An organization has experienced a series of data breaches and needs to ensure that data remains protected even if intercepted.

Which security measure should be implemented?

Options:

A.

Role-based access control (RBAC)

B.

Two-factor authentication (2FA)

C.

Data encryption

D.

Patch management

Buy Now
Question # 16

An attacker issues commands to access a file on a network drive and overwrite it with new data.

What is the purpose of the attack?

Options:

A.

Data modification

B.

Launch point

C.

Data export

D.

Denial of availability

Buy Now
Question # 17

A start-up company wants to build its computer network by starting with the base-level resources offered by a cloud service. In this way, the company won't have to buy physical hardware but canstill have complete control over operating systems and other software.

Which cloud service model should be used?

Options:

A.

Software as a Service (SaaS)

B.

Function as a Service (FaaS)

C.

Infrastructure as a Service (IaaS)

D.

Platform as a Service (PaaS)

Buy Now
Question # 18

A library has a network that allows patrons to use their mobile devices to connect to the internet.

Which type of network is described?

Options:

A.

SAN

B.

MAN

C.

PAN

D.

WLAN

Buy Now
Question # 19

Which statement describes the Integrity tenet of IT security?

Options:

A.

It involves transmitting network data without any errors.

B.

It requires the encryption of sensitive data transmission.

C.

It requires that network applications be accessible to users.

D.

It involves keeping systems accessible for network users.

Buy Now
Question # 20

What is an IT infrastructure security tenet of the CIA triad that counters passive attacks that aim to steal or intercept data?

Options:

A.

Adaptation

B.

Confidentiality

C.

Availability

D.

Integrity

Buy Now
Question # 21

An organization has experienced injection attacks in the past and wants to take actions to mitigate this type of attack.

What should this organization do?

Options:

A.

Detect code vulnerabilities

B.

Decrease the wireless range

C.

Use server-side validation

D.

Use Wi-Fi Protected Access 2 (WPA2)

Buy Now
Exam Name: Network-and-Security-Foundation
Last Update: Apr 2, 2025
Questions: 62
Network-and-Security-Foundation pdf

Network-and-Security-Foundation PDF

$25.5  $84.99
Network-and-Security-Foundation Engine

Network-and-Security-Foundation Testing Engine

$28.5  $94.99
Network-and-Security-Foundation PDF + Engine

Network-and-Security-Foundation PDF + Testing Engine

$40.5  $134.99