Pass the WGU Courses and Certificates Network-and-Security-Foundation Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

A person is troubleshooting a network issue and needs to see a list of all active network connections.

Which Linux command should be used?

Options:

A.

nslookup


B.

netstat


C.

dig


D.

ifconfig


Expert Solution
Questions # 2:

An organization has experienced a series of data breaches and needs to ensure that data remains protected even if intercepted.

Which security measure should be implemented?

Options:

A.

Role-based access control (RBAC)


B.

Two-factor authentication (2FA)


C.

Data encryption


D.

Patch management


Expert Solution
Questions # 3:

In the process of setting up a Linux-based network system, a technician needs to determine if there is connectivity to a hostname.

Which command should be used?

Options:

A.

ping


B.

nslookup


C.

ifconfig


D.

dig


Expert Solution
Questions # 4:

An attacker sends emails claiming that an online account has been locked. The email provides a fake link with the goal of tricking users into providing login credentials.

Which malicious attack strategy is represented in the scenario?

Options:

A.

Phishing


B.

IP address spoofing


C.

Session hijacking


D.

Man-in-the-middle attack


Expert Solution
Questions # 5:

An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.

Which device should be used?

Options:

A.

Router


B.

Access point


C.

Server


D.

Switch


Expert Solution
Questions # 6:

An attacker uses a list of commonly used access credentials to attempt to gain access to an online account.

Which malicious attack strategy is represented in the scenario?

Options:

A.

Phishing


B.

Dictionary attack


C.

Credential stuffing


D.

Social engineering


Expert Solution
Questions # 7:

An attacker uses login data from a data breach to attempt to access another web service.

Which malicious attack strategy is represented in the scenario?

Options:

A.

Brute-force attack


B.

Credential stuffing


C.

Session hijacking


D.

Social engineering


Expert Solution
Questions # 8:

Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to test DNS resolution against a host.

Which command in Linux should be used for this purpose?

Options:

A.

traceroute


B.

netstat


C.

dig


D.

ifconfig


Expert Solution
Questions # 9:

A company wants to implement virtual machines with a focus on security and efficiency.

Which type of hypervisor fits the need described in the scenario?

Options:

A.

Open source


B.

Proprietary


C.

Type 1


D.

Type 2


Expert Solution
Questions # 10:

A computer network has software that tracks successful and unsuccessful connection attempts to the network in order to better identify attacks.

Which network security concept does this scenario address?

Options:

A.

Accounting


B.

Authentication


C.

Availability


D.

Authorization


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions