Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

WGU Network-and-Security-Foundation - Network-and-Security-Foundation

Which layer of the TCP/IP model includes the Internet Protocol (IP)?

A.

Physical or network access

B.

Application

C.

Network or internet

D.

Transport

A computer network has software that tracks successful and unsuccessful connection attempts to the network in order to better identify attacks.

Which network security concept does this scenario address?

A.

Accounting

B.

Authentication

C.

Availability

D.

Authorization

A company is ensuring that its network protocol meets encryption standards.

What is the CIA triad component targeted in the scenario?

A.

Integrity

B.

Consistency

C.

Availability

D.

Confidentiality

A host is already set up with an operating system. An administrator wants to install a hypervisor atop the operating system to allow for setting up virtual machines.

Which hypervisor should be used?

A.

Open source

B.

Proprietary

C.

Type 1

D.

Type 2

An attacker uses a network device to take over an existing connection between two network computers.

Which malicious attack strategy is represented in the scenario?

A.

Dictionary attack

B.

Social engineering

C.

Session hijacking

D.

IP address spoofing

Which layer of the OSI model includes the ICMP?

A.

Transport

B.

Session

C.

Network

D.

Application

Which scenario demonstrates a violation of the integrity component of the CIA triad?

A.

A network's domain name system server has not been fully operational for one month.

B.

An employee accidentally modified a customer account incorrectly.

C.

A company has an unacceptably high network downtime during high-traffic time periods.

D.

A company stores sensitive customer data without access controls.

Access to a company's information system requires a user to be within a valid geographic location and to enter a valid username and password.

Which concept does this scenario demonstrate?

A.

Certificate verification

B.

Multifactor authentication

C.

User-based accounting

D.

Single sign-on