Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

WGU Network-and-Security-Foundation - Network-and-Security-Foundation

An organization has experienced a series of data breaches and needs to ensure that data remains protected even if intercepted.

Which security measure should be implemented?

A.

Role-based access control (RBAC)

B.

Two-factor authentication (2FA)

C.

Data encryption

D.

Patch management

What is a CIA triad component that involves keeping systems accessible for network users?

A.

Availability

B.

Innovation

C.

Integrity

D.

Confidentiality

An organization is updating its information security policies in order to comply with thePersonal Information Protection and Electronic Documents Act (PIPEDA).

What should this organization expect to be required under this legislation?

A.

Securely dispose of personally identifiable information

B.

Compensate individuals for revenue from the sale of their information

C.

Notify individuals each time their personal information is viewed

D.

Disclose the software used to protect personal data

After a series of attacks, an organization needs to bolster its data protection measures.

Which strategy should be used to increase data protection?

A.

Use a variable network topology

B.

Have restoration policies in place

C.

Require that passwords change weekly

D.

Implement wired equivalent privacy (WEP)

In the process of setting up a Linux-based network system, a technician needs to determine if there is connectivity to a hostname.

Which command should be used?

A.

ping

B.

nslookup

C.

ifconfig

D.

dig

A company is designing an information system and is maintaining a focus on the user experience and resulting productivity rather than on the technology itself.

What is the security principle implemented in this scenario?

A.

Least common mechanism

B.

Fail-safe

C.

Zero-trust model

D.

Human-centeredness

An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.

Which device should be used?

A.

Router

B.

Access point

C.

Server

D.

Switch

An attacker issues commands to access a file on a network drive and overwrite it with new data.

What is the purpose of the attack?

A.

Data modification

B.

Launch point

C.

Data export

D.

Denial of availability

An organization has experienced rogue access points in the past and wants to take actions to mitigate this type of attack.

What should this organization do?

A.

Require complex passwords

B.

Use monitor mode scanning

C.

Use server-side validation

D.

Disallow ICMP packets on the firewall

An attacker uses a list of commonly used access credentials to attempt to gain access to an online account.

Which malicious attack strategy is represented in the scenario?

A.

Phishing

B.

Dictionary attack

C.

Credential stuffing

D.

Social engineering