Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Network-and-Security-Foundation Question and Answers

Network-and-Security-Foundation

Last Update Nov 30, 2025
Total Questions : 62

We are offering FREE Network-and-Security-Foundation WGU exam questions. All you do is to just go and sign up. Give your details, prepare Network-and-Security-Foundation free exam questions and then go for complete pool of Network-and-Security-Foundation test questions that will help you more.

Network-and-Security-Foundation pdf

Network-and-Security-Foundation PDF

$36.75  $104.99
Network-and-Security-Foundation Engine

Network-and-Security-Foundation Testing Engine

$43.75  $124.99
Network-and-Security-Foundation PDF + Engine

Network-and-Security-Foundation PDF + Testing Engine

$57.75  $164.99
Questions 1

An organization is evaluating its internal network. Currently, each device is connected to two adjacent devices, one on either side.

Which type of network topology is being used?

Options:

A.  

Point-to-point

B.  

Bus

C.  

Star

D.  

Ring

Discussion 0
Questions 2

Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to test DNS resolution against a host.

Which command in Linux should be used for this purpose?

Options:

A.  

traceroute

B.  

netstat

C.  

dig

D.  

ifconfig

Discussion 0
Questions 3

A company is designing an information system and is maintaining a focus on the user experience and resulting productivity rather than on the technology itself.

What is the security principle implemented in this scenario?

Options:

A.  

Least common mechanism

B.  

Fail-safe

C.  

Zero-trust model

D.  

Human-centeredness

Discussion 0
Questions 4

After recently experiencing a security breach, a company is working on improving its database security. As a part of its security governance strategies, the company is developing a database security checklist.

Which component is important to include in this checklist?

Options:

A.  

Disclosing any instances of breaches of personal data

B.  

Restricting physical access to locations where data is housed

C.  

Developing algorithms for secure access to data

D.  

Outsourcing data management to third-party vendors

Discussion 0
Questions 5

A company wants to use a cloud service to obtain virtual machines with pre-installed and configured software.

Which cloud service model should be used?

Options:

A.  

Software as a Service (SaaS)

B.  

Infrastructure as a Service (IaaS)

C.  

Platform as a Service (PaaS)

D.  

Function as a Service (FaaS)

Discussion 0
Questions 6

Which scenario demonstrates a violation of the integrity component of the CIA triad?

Options:

A.  

A network's domain name system server has not been fully operational for one month.

B.  

An employee accidentally modified a customer account incorrectly.

C.  

A company has an unacceptably high network downtime during high-traffic time periods.

D.  

A company stores sensitive customer data without access controls.

Discussion 0
Questions 7

A person is troubleshooting a network issue and needs to see details about network adapters and their settings.

Which Windows command should be used?

Options:

A.  

ipconfig

B.  

traceroute

C.  

nslookup

D.  

netstat

Discussion 0
Questions 8

A company has a legacy network in which all devices receive all messages transmitted by a central wire.

Which network topology is described?

Options:

A.  

Star

B.  

Point-to-point

C.  

Bus

D.  

Ring

Discussion 0
Questions 9

An organization's network has been the target of several cyberattacks.

Which strategy should the organization use for Wi-Fi hardening?

Options:

A.  

Trust local hosts by default

B.  

Disable ESSID broadcasting

C.  

Add more access points

D.  

Implement wired equivalent privacy (WEP)

Discussion 0
Questions 10

Access to a company's information system requires a user to be within a valid geographic location and to enter a valid username and password.

Which concept does this scenario demonstrate?

Options:

A.  

Certificate verification

B.  

Multifactor authentication

C.  

User-based accounting

D.  

Single sign-on

Discussion 0
Questions 11

A company wants to implement a cloud service to obtain access to virtual machines. The company wants to be able to choose the operating systems and configure each of the machines.

What is the type of cloud service model that fits the needs of this company?

Options:

A.  

Function as a Service (FaaS)

B.  

Infrastructure as a Service (IaaS)

C.  

Platform as a Service (PaaS)

D.  

Software as a Service (SaaS)

Discussion 0
Questions 12

An organization is the victim of an attack in which an attacker targets a computer to use as a tool to infect and target other computers in a larger attack.

What is the purpose of this attack?

Options:

A.  

Denial of availability

B.  

Data export

C.  

Data modification

D.  

Launch point

Discussion 0
Questions 13

What is the component of the CIA triad for IT security that requires that IP packets be retransmitted if the receiving host has an invalid checksum value?

Options:

A.  

Consistency

B.  

Confidentiality

C.  

Availability

D.  

Integrity

Discussion 0
Questions 14

An organization's network has been the target of several cyberattacks.

Which strategy should the organization use for Wi-Fi hardening?

Options:

A.  

Implement wired equivalent privacy (WEP)

B.  

Configure RADIUS authentication

C.  

Implement a bus topology

D.  

Avoid the use of asymmetric encryption

Discussion 0
Questions 15

A start-up company wants to build its computer network by starting with the base-level resources offered by a cloud service. In this way, the company won't have to buy physical hardware but canstill have complete control over operating systems and other software.

Which cloud service model should be used?

Options:

A.  

Software as a Service (SaaS)

B.  

Function as a Service (FaaS)

C.  

Infrastructure as a Service (IaaS)

D.  

Platform as a Service (PaaS)

Discussion 0
Questions 16

Which layer of the TCP/IP model includes the Internet Protocol (IP)?

Options:

A.  

Physical or network access

B.  

Application

C.  

Network or internet

D.  

Transport

Discussion 0
Questions 17

An attacker uses a poisoned domain name on the domain name server to navigate users to the attacker's site.

Which malicious attack strategy is represented in the scenario?

Options:

A.  

Pharming

B.  

Brute-force attack

C.  

IP address spoofing

D.  

Session hijacking

Discussion 0
Questions 18

What is the TCP/IP layer that includes the User Datagram Protocol (UDP)?

Options:

A.  

Application

B.  

Network or internet

C.  

Physical or network access

D.  

Transport

Discussion 0