WGU Network-and-Security-Foundation - Network-and-Security-Foundation
Total 62 questions
An organization has experienced a series of data breaches and needs to ensure that data remains protected even if intercepted.
Which security measure should be implemented?
What is a CIA triad component that involves keeping systems accessible for network users?
An organization is updating its information security policies in order to comply with thePersonal Information Protection and Electronic Documents Act (PIPEDA).
What should this organization expect to be required under this legislation?
After a series of attacks, an organization needs to bolster its data protection measures.
Which strategy should be used to increase data protection?
In the process of setting up a Linux-based network system, a technician needs to determine if there is connectivity to a hostname.
Which command should be used?
A company is designing an information system and is maintaining a focus on the user experience and resulting productivity rather than on the technology itself.
What is the security principle implemented in this scenario?
An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.
Which device should be used?
An attacker issues commands to access a file on a network drive and overwrite it with new data.
What is the purpose of the attack?
An organization has experienced rogue access points in the past and wants to take actions to mitigate this type of attack.
What should this organization do?
An attacker uses a list of commonly used access credentials to attempt to gain access to an online account.
Which malicious attack strategy is represented in the scenario?