Pass the WGU Courses and Certificates Network-and-Security-Foundation Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which component of the IT securityCIA triadis a driver for enabling data encryption?

Options:

A.

Application


B.

Integrity


C.

Confidentiality


D.

Availability


Expert Solution
Questions # 12:

When setting up a network, a technician needs a router that creates an access point.

Which router should be used?

Options:

A.

Wireless router


B.

Broadband router


C.

Core router


D.

Inter-provider border router


Expert Solution
Questions # 13:

What is the layer of the OSI model that creates, maintains, and disconnects process communications over the network?

Options:

A.

Data link


B.

Physical


C.

Session


D.

Transport


Expert Solution
Questions # 14:

A company grants users permissions based on the department in which users work.

Which type of access control is involved?

Options:

A.

Attribute-based


B.

Role-based


C.

Context-based


D.

Discretionary


Expert Solution
Questions # 15:

Which layer of the OSI model includes the ICMP?

Options:

A.

Transport


B.

Session


C.

Network


D.

Application


Expert Solution
Questions # 16:

An attacker issues commands to access a file on a network drive and overwrite it with new data.

What is the purpose of the attack?

Options:

A.

Data modification


B.

Launch point


C.

Data export


D.

Denial of availability


Expert Solution
Questions # 17:

What is the TCP/IP layer that includes the User Datagram Protocol (UDP)?

Options:

A.

Application


B.

Network or internet


C.

Physical or network access


D.

Transport


Expert Solution
Questions # 18:

A developer is using shared functions for software code in order to reduce complexity, knowing that greater complexity and volume of code are harder to defend against attacks.

Which security principle is demonstrated in this scenario?

Options:

A.

Economy of mechanism


B.

Least common mechanism


C.

Least privilege


D.

Zero-trust model


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions