Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

Network-and-Security-Foundation Exam Dumps - WGU Courses and Certificates Questions and Answers

Question # 4

An organization is the victim of an attack in which an attacker uses a forged employee ID card to deceive a company employee into providing sensitive information.

What is the type of cyberattack described in this scenario?

Options:

A.

Brute-force attack

B.

Man-in-the-middle attack

C.

Social engineering

D.

Pharming

Buy Now
Question # 5

An attacker uses a poisoned domain name on the domain name server to navigate users to the attacker's site.

Which malicious attack strategy is represented in the scenario?

Options:

A.

Pharming

B.

Brute-force attack

C.

IP address spoofing

D.

Session hijacking

Buy Now
Question # 6

What is the TCP/IP layer that includes the User Datagram Protocol (UDP)?

Options:

A.

Application

B.

Network or internet

C.

Physical or network access

D.

Transport

Buy Now
Question # 7

After a series of attacks, an organization needs to bolster its data protection measures.

Which strategy should be used to increase data protection?

Options:

A.

Use a variable network topology

B.

Have restoration policies in place

C.

Require that passwords change weekly

D.

Implement wired equivalent privacy (WEP)

Buy Now
Question # 8

A company is specifically worried about buffer overflow attacks.

Which strategy should be used as a mitigation against this type of attack?

Options:

A.

Detect code vulnerabilities

B.

Disable caching

C.

Use server-side validation

D.

Implement intrusion protection software

Buy Now
Question # 9

An organization is updating its information security policies in order to comply with thePersonal Information Protection and Electronic Documents Act (PIPEDA).

What should this organization expect to be required under this legislation?

Options:

A.

Securely dispose of personally identifiable information

B.

Compensate individuals for revenue from the sale of their information

C.

Notify individuals each time their personal information is viewed

D.

Disclose the software used to protect personal data

Buy Now
Question # 10

A host is already set up with an operating system. An administrator wants to install a hypervisor atop the operating system to allow for setting up virtual machines.

Which hypervisor should be used?

Options:

A.

Open source

B.

Proprietary

C.

Type 1

D.

Type 2

Buy Now
Question # 11

A company grants users permissions based on the department in which users work.

Which type of access control is involved?

Options:

A.

Attribute-based

B.

Role-based

C.

Context-based

D.

Discretionary

Buy Now
Question # 12

Which layer of the OSI model includes the TCP?

Options:

A.

Application

B.

Transport

C.

Session

D.

Network

Buy Now
Question # 13

An attacker uses login data from a data breach to attempt to access another web service.

Which malicious attack strategy is represented in the scenario?

Options:

A.

Brute-force attack

B.

Credential stuffing

C.

Session hijacking

D.

Social engineering

Buy Now
Exam Name: Network-and-Security-Foundation
Last Update: Apr 1, 2025
Questions: 62
Network-and-Security-Foundation pdf

Network-and-Security-Foundation PDF

$25.5  $84.99
Network-and-Security-Foundation Engine

Network-and-Security-Foundation Testing Engine

$28.5  $94.99
Network-and-Security-Foundation PDF + Engine

Network-and-Security-Foundation PDF + Testing Engine

$40.5  $134.99