Special Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

WGU Network-and-Security-Foundation Network-and-Security-Foundation Exam Practice Test

Page: 1 / 6
Total 62 questions

Network-and-Security-Foundation Questions and Answers

Question 1

What is a CIA triad component that involves keeping systems accessible for network users?

Options:

A.

Availability

B.

Innovation

C.

Integrity

D.

Confidentiality

Question 2

An attacker sends emails claiming that an online account has been locked. The email provides a fake link with the goal of tricking users into providing login credentials.

Which malicious attack strategy is represented in the scenario?

Options:

A.

Phishing

B.

IP address spoofing

C.

Session hijacking

D.

Man-in-the-middle attack

Question 3

A company is ensuring that its network protocol meets encryption standards.

What is the CIA triad component targeted in the scenario?

Options:

A.

Integrity

B.

Consistency

C.

Availability

D.

Confidentiality

Question 4

What is an IT infrastructure security tenet of the CIA triad that counters passive attacks that aim to steal or intercept data?

Options:

A.

Adaptation

B.

Confidentiality

C.

Availability

D.

Integrity

Question 5

A company grants users permissions based on the department in which users work.

Which type of access control is involved?

Options:

A.

Attribute-based

B.

Role-based

C.

Context-based

D.

Discretionary

Question 6

An organization does not have controls in place to limit employee access to sensitive customer data.

What is a component of the CIA triad that is violated?

Options:

A.

Confidentiality

B.

Integrity

C.

Availability

D.

Interpretation

Question 7

Which layer of the TCP/IP model includes the Internet Protocol (IP)?

Options:

A.

Physical or network access

B.

Application

C.

Network or internet

D.

Transport

Question 8

An attacker uses a list of commonly used access credentials to attempt to gain access to an online account.

Which malicious attack strategy is represented in the scenario?

Options:

A.

Phishing

B.

Dictionary attack

C.

Credential stuffing

D.

Social engineering

Question 9

After recently experiencing a security breach, a company is working on improving its database security. As a part of its security governance strategies, the company is developing a database security checklist.

Which component is important to include in this checklist?

Options:

A.

Disclosing any instances of breaches of personal data

B.

Restricting physical access to locations where data is housed

C.

Developing algorithms for secure access to data

D.

Outsourcing data management to third-party vendors

Question 10

Which scenario demonstrates a violation of the integrity component of the CIA triad?

Options:

A.

A network's domain name system server has not been fully operational for one month.

B.

An employee accidentally modified a customer account incorrectly.

C.

A company has an unacceptably high network downtime during high-traffic time periods.

D.

A company stores sensitive customer data without access controls.

Question 11

An attacker uses a network device to take over an existing connection between two network computers.

Which malicious attack strategy is represented in the scenario?

Options:

A.

Dictionary attack

B.

Social engineering

C.

Session hijacking

D.

IP address spoofing

Question 12

A company wants to use a cloud service to obtain virtual machines with pre-installed and configured software.

Which cloud service model should be used?

Options:

A.

Software as a Service (SaaS)

B.

Infrastructure as a Service (IaaS)

C.

Platform as a Service (PaaS)

D.

Function as a Service (FaaS)

Question 13

A host is already set up with an operating system. An administrator wants to install a hypervisor atop the operating system to allow for setting up virtual machines.

Which hypervisor should be used?

Options:

A.

Open source

B.

Proprietary

C.

Type 1

D.

Type 2

Question 14

Access to a company's information system requires a user to be within a valid geographic location and to enter a valid username and password.

Which concept does this scenario demonstrate?

Options:

A.

Certificate verification

B.

Multifactor authentication

C.

User-based accounting

D.

Single sign-on

Question 15

A company is developing a disaster recovery plan for its internal network.

What is the CIA triad component targeted in the scenario?

Options:

A.

Innovation

B.

Confidentiality

C.

Availability

D.

Integrity

Question 16

An organization is the victim of an attack in which an attacker uses a forged employee ID card to deceive a company employee into providing sensitive information.

What is the type of cyberattack described in this scenario?

Options:

A.

Brute-force attack

B.

Man-in-the-middle attack

C.

Social engineering

D.

Pharming

Question 17

What is the TCP/IP layer that includes the User Datagram Protocol (UDP)?

Options:

A.

Application

B.

Network or internet

C.

Physical or network access

D.

Transport

Question 18

An attacker changes a computer's identification to appear as an authorized computer in a target network.

Which type of cyberattack is described?

Options:

A.

Pharming

B.

Man-in-the-middle attack

C.

Session hijacking

D.

IP address spoofing

Page: 1 / 6
Total 62 questions