Black Friday Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 2
Total 18 questions
Exam Code: Network-and-Security-Foundation                Update: Nov 30, 2025
Exam Name: Network-and-Security-Foundation

WGU Network-and-Security-Foundation Network-and-Security-Foundation Exam Dumps: Updated Questions & Answers (November 2025)

Question # 1

Which component of the IT securityCIA triadis a driver for enabling data encryption?

A.

Application

B.

Integrity

C.

Confidentiality

D.

Availability

Question # 2

Which layer of the OSI model includes the TCP?

A.

Application

B.

Transport

C.

Session

D.

Network

Question # 3

An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.

Which device should be used?

A.

Router

B.

Access point

C.

Server

D.

Switch

Question # 4

A company’s internal messaging system is being redesigned. The authentication procedures were so cumbersome that employees were using personal email to communicate.

What is the security principle implemented in this scenario?

A.

Zero-trust model

B.

Least common mechanism

C.

Psychological acceptability

D.

Fail-safe

Question # 5

An attacker sends emails claiming that an online account has been locked. The email provides a fake link with the goal of tricking users into providing login credentials.

Which malicious attack strategy is represented in the scenario?

A.

Phishing

B.

IP address spoofing

C.

Session hijacking

D.

Man-in-the-middle attack

Question # 6

In order to reduce the risk of insider attacks, a company assigns role-based permissions to its users.

Which network security concept does this scenario address?

A.

Authentication

B.

Accounting

C.

Availability

D.

Authorization

Question # 7

A company wants to use a cloud service to obtain virtual machines with pre-installed and configured software.

Which cloud service model should be used?

A.

Software as a Service (SaaS)

B.

Infrastructure as a Service (IaaS)

C.

Platform as a Service (PaaS)

D.

Function as a Service (FaaS)

Question # 8

An organization's network has been the target of several cyberattacks.

Which strategy should the organization use for Wi-Fi hardening?

A.

Trust local hosts by default

B.

Disable ESSID broadcasting

C.

Add more access points

D.

Implement wired equivalent privacy (WEP)

Question # 9

An attacker uses malicious software to disable network resources, demanding a ransom to restore access.

Which category describes the purpose of the attack?

A.

Data modification

B.

Denial of availability

C.

Data export

D.

Launch point

Question # 10

When setting up a network, a technician needs a router that creates an access point.

Which router should be used?

A.

Wireless router

B.

Broadband router

C.

Core router

D.

Inter-provider border router

Page: 1 / 2
Total 18 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 30 Nov 2025