WGU Network-and-Security-Foundation - Network-and-Security-Foundation
Total 62 questions
Which layer of the TCP/IP model includes the Internet Protocol (IP)?
A computer network has software that tracks successful and unsuccessful connection attempts to the network in order to better identify attacks.
Which network security concept does this scenario address?
A company is ensuring that its network protocol meets encryption standards.
What is the CIA triad component targeted in the scenario?
A host is already set up with an operating system. An administrator wants to install a hypervisor atop the operating system to allow for setting up virtual machines.
Which hypervisor should be used?
An attacker uses a network device to take over an existing connection between two network computers.
Which malicious attack strategy is represented in the scenario?
Which layer of the OSI model includes the ICMP?
Which scenario demonstrates a violation of the integrity component of the CIA triad?
Access to a company's information system requires a user to be within a valid geographic location and to enter a valid username and password.
Which concept does this scenario demonstrate?