Special Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

Network-and-Security-Foundation Network-and-Security-Foundation Questions and Answers

Questions 4

An organization's network has been the target of several cyberattacks.

Which strategy should the organization use for Wi-Fi hardening?

Options:

A.

Trust local hosts by default

B.

Disable ESSID broadcasting

C.

Add more access points

D.

Implement wired equivalent privacy (WEP)

Buy Now
Questions 5

A company wants to use a cloud service to obtain virtual machines with pre-installed and configured software.

Which cloud service model should be used?

Options:

A.

Software as a Service (SaaS)

B.

Infrastructure as a Service (IaaS)

C.

Platform as a Service (PaaS)

D.

Function as a Service (FaaS)

Buy Now
Questions 6

A computer network has software that tracks successful and unsuccessful connection attempts to the network in order to better identify attacks.

Which network security concept does this scenario address?

Options:

A.

Accounting

B.

Authentication

C.

Availability

D.

Authorization

Buy Now
Questions 7

An attacker uses a network device to take over an existing connection between two network computers.

Which malicious attack strategy is represented in the scenario?

Options:

A.

Dictionary attack

B.

Social engineering

C.

Session hijacking

D.

IP address spoofing

Buy Now
Questions 8

A person is troubleshooting a network issue and needs to see a list of all active network connections.

Which Linux command should be used?

Options:

A.

nslookup

B.

netstat

C.

dig

D.

ifconfig

Buy Now
Questions 9

When setting up a network, a technician needs a router that connects computers together and connects computers to the internet.

Which router should be used?

Options:

A.

Inter-provider border router

B.

Subscriber edge router

C.

Broadband router

D.

Core router

Buy Now
Questions 10

Which layer of the OSI model includes HTTP?

Options:

A.

Application

B.

Network

C.

Session

D.

Transport

Buy Now
Questions 11

A company grants users permissions based on the department in which users work.

Which type of access control is involved?

Options:

A.

Attribute-based

B.

Role-based

C.

Context-based

D.

Discretionary

Buy Now
Questions 12

A company is ensuring that its network protocol meets encryption standards.

What is the CIA triad component targeted in the scenario?

Options:

A.

Integrity

B.

Consistency

C.

Availability

D.

Confidentiality

Buy Now
Questions 13

A person is troubleshooting a network issue and needs to see details about network adapters and their settings.

Which Windows command should be used?

Options:

A.

ipconfig

B.

traceroute

C.

nslookup

D.

netstat

Buy Now
Questions 14

Which statement describes the Integrity tenet of IT security?

Options:

A.

It involves transmitting network data without any errors.

B.

It requires the encryption of sensitive data transmission.

C.

It requires that network applications be accessible to users.

D.

It involves keeping systems accessible for network users.

Buy Now
Questions 15

Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to test DNS resolution against a host.

Which command in Linux should be used for this purpose?

Options:

A.

traceroute

B.

netstat

C.

dig

D.

ifconfig

Buy Now
Questions 16

An organization is updating its information security policies in order to comply with thePersonal Information Protection and Electronic Documents Act (PIPEDA).

What should this organization expect to be required under this legislation?

Options:

A.

Securely dispose of personally identifiable information

B.

Compensate individuals for revenue from the sale of their information

C.

Notify individuals each time their personal information is viewed

D.

Disclose the software used to protect personal data

Buy Now
Questions 17

An attacker uses a list of commonly used access credentials to attempt to gain access to an online account.

Which malicious attack strategy is represented in the scenario?

Options:

A.

Phishing

B.

Dictionary attack

C.

Credential stuffing

D.

Social engineering

Buy Now
Questions 18

An attacker changes a computer's identification to appear as an authorized computer in a target network.

Which type of cyberattack is described?

Options:

A.

Pharming

B.

Man-in-the-middle attack

C.

Session hijacking

D.

IP address spoofing

Buy Now
Exam Name: Network-and-Security-Foundation
Last Update: Apr 2, 2025
Questions: 62
Network-and-Security-Foundation pdf

Network-and-Security-Foundation PDF

$25.5  $84.99
Network-and-Security-Foundation Engine

Network-and-Security-Foundation Testing Engine

$30  $99.99
Network-and-Security-Foundation PDF + Engine

Network-and-Security-Foundation PDF + Testing Engine

$40.5  $134.99