Network-and-Security-Foundation
Last Update Nov 30, 2025
Total Questions : 62
We are offering FREE Network-and-Security-Foundation WGU exam questions. All you do is to just go and sign up. Give your details, prepare Network-and-Security-Foundation free exam questions and then go for complete pool of Network-and-Security-Foundation test questions that will help you more.
An organization is evaluating its internal network. Currently, each device is connected to two adjacent devices, one on either side.
Which type of network topology is being used?
Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to test DNS resolution against a host.
Which command in Linux should be used for this purpose?
A company is designing an information system and is maintaining a focus on the user experience and resulting productivity rather than on the technology itself.
What is the security principle implemented in this scenario?
After recently experiencing a security breach, a company is working on improving its database security. As a part of its security governance strategies, the company is developing a database security checklist.
Which component is important to include in this checklist?
A company wants to use a cloud service to obtain virtual machines with pre-installed and configured software.
Which cloud service model should be used?
Which scenario demonstrates a violation of the integrity component of the CIA triad?
A person is troubleshooting a network issue and needs to see details about network adapters and their settings.
Which Windows command should be used?
A company has a legacy network in which all devices receive all messages transmitted by a central wire.
Which network topology is described?
An organization's network has been the target of several cyberattacks.
Which strategy should the organization use for Wi-Fi hardening?
Access to a company's information system requires a user to be within a valid geographic location and to enter a valid username and password.
Which concept does this scenario demonstrate?
A company wants to implement a cloud service to obtain access to virtual machines. The company wants to be able to choose the operating systems and configure each of the machines.
What is the type of cloud service model that fits the needs of this company?
An organization is the victim of an attack in which an attacker targets a computer to use as a tool to infect and target other computers in a larger attack.
What is the purpose of this attack?
What is the component of the CIA triad for IT security that requires that IP packets be retransmitted if the receiving host has an invalid checksum value?
An organization's network has been the target of several cyberattacks.
Which strategy should the organization use for Wi-Fi hardening?
A start-up company wants to build its computer network by starting with the base-level resources offered by a cloud service. In this way, the company won't have to buy physical hardware but canstill have complete control over operating systems and other software.
Which cloud service model should be used?
An attacker uses a poisoned domain name on the domain name server to navigate users to the attacker's site.
Which malicious attack strategy is represented in the scenario?