Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

Network-and-Security-Foundation WGU Network-and-Security-Foundation Free Practice Exam Questions (2025 Updated)

Prepare effectively for your WGU Network-and-Security-Foundation Network-and-Security-Foundation certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 62 questions

When setting up a network, a technician needs a router that connects computers together and connects computers to the internet.

Which router should be used?

A.

Inter-provider border router

B.

Subscriber edge router

C.

Broadband router

D.

Core router

Which layer of the TCP/IP model includes the Internet Protocol (IP)?

A.

Physical or network access

B.

Application

C.

Network or internet

D.

Transport

A computer network has software that tracks successful and unsuccessful connection attempts to the network in order to better identify attacks.

Which network security concept does this scenario address?

A.

Accounting

B.

Authentication

C.

Availability

D.

Authorization

What is the TCP/IP layer that includes the User Datagram Protocol (UDP)?

A.

Application

B.

Network or internet

C.

Physical or network access

D.

Transport

An organization is evaluating its internal network. Currently, each device is connected to two adjacent devices, one on either side.

Which type of network topology is being used?

A.

Point-to-point

B.

Bus

C.

Star

D.

Ring

An attacker uses login data from a data breach to attempt to access another web service.

Which malicious attack strategy is represented in the scenario?

A.

Brute-force attack

B.

Credential stuffing

C.

Session hijacking

D.

Social engineering

What is the component of the CIA triad for IT security that requires that IP packets be retransmitted if the receiving host has an invalid checksum value?

A.

Consistency

B.

Confidentiality

C.

Availability

D.

Integrity

Which scenario demonstrates a violation of the integrity component of the CIA triad?

A.

A network's domain name system server has not been fully operational for one month.

B.

An employee accidentally modified a customer account incorrectly.

C.

A company has an unacceptably high network downtime during high-traffic time periods.

D.

A company stores sensitive customer data without access controls.

Which CIA triad component is a driver for enabling role-based access controls?

A.

Integrity

B.

Availability

C.

Confidentiality

D.

Consistency

A person is troubleshooting a network issue and needs to see details about network adapters and their settings.

Which Windows command should be used?

A.

ipconfig

B.

traceroute

C.

nslookup

D.

netstat

A company wants to implement virtual machines with a focus on security and efficiency.

Which type of hypervisor fits the need described in the scenario?

A.

Open source

B.

Proprietary

C.

Type 1

D.

Type 2

In the process of setting up a Linux-based network system, a technician needs to determine if there is connectivity to a hostname.

Which command should be used?

A.

ping

B.

nslookup

C.

ifconfig

D.

dig

A company grants users permissions based on the department in which users work.

Which type of access control is involved?

A.

Attribute-based

B.

Role-based

C.

Context-based

D.

Discretionary

A company’s internal messaging system is being redesigned. The authentication procedures were so cumbersome that employees were using personal email to communicate.

What is the security principle implemented in this scenario?

A.

Zero-trust model

B.

Least common mechanism

C.

Psychological acceptability

D.

Fail-safe

An organization's network has been the target of several cyberattacks.

Which strategy should the organization use for Wi-Fi hardening?

A.

Implement wired equivalent privacy (WEP)

B.

Configure RADIUS authentication

C.

Implement a bus topology

D.

Avoid the use of asymmetric encryption

An organization is updating its information security policies in order to comply with thePersonal Information Protection and Electronic Documents Act (PIPEDA).

What should this organization expect to be required under this legislation?

A.

Securely dispose of personally identifiable information

B.

Compensate individuals for revenue from the sale of their information

C.

Notify individuals each time their personal information is viewed

D.

Disclose the software used to protect personal data

A company is designing an information system and is maintaining a focus on the user experience and resulting productivity rather than on the technology itself.

What is the security principle implemented in this scenario?

A.

Least common mechanism

B.

Fail-safe

C.

Zero-trust model

D.

Human-centeredness

Which layer of the OSI model includes HTTP?

A.

Application

B.

Network

C.

Session

D.

Transport

Page: 1 / 1
Total 62 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved