Network-and-Security-Foundation 온라인 연습
최종 업데이트 시간: 2025년10월03일
당신은 온라인 연습 문제를 통해 WGU Network and Security Foundation 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.
시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 Network and Security Foundation 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 62개의 시험 문제와 답을 포함하십시오.
정답:
Explanation:
Human-centerednessin security design prioritizesuser experience and productivitywhile implementing security measures. It ensures that security policies are intuitive and do not excessively burden users, reducing resistance to security compliance.
Least common mechanismminimizes shared resources to enhance security.
Fail-safeensures secure defaults in case of system failure.
Zero-trust modelassumes no inherent trust in users or devices.
정답:
Explanation:
Role-Based Access Control (RBAC)assigns permissions based on a user's role within an organization, such as department, job function, or hierarchy. This ensures that usersonly have access to resources necessary for their duties.
Attribute-based access control (ABAC)considers dynamic attributes like time, location, and device.
Context-based access controlrestricts access based on environmental conditions.
Discretionary access control (DAC)allows data owners to determine access rights.
정답:
Explanation:
This scenario describes adata exportattack, where an attacker steals sensitive information (e.g., personal data, trade secrets, or financial records) and transfers it to another entity, often for malicious purposes.
Launch pointrefers to using a compromised system for further attacks.
Denial of availabilitydisrupts access to resources.
Data modificationinvolves unauthorized changes rather than theft.
정답:
Explanation:
Data encryptionprotects sensitive information by encoding it into an unreadable format, ensuring that even if attackers intercept the data, they cannot decipher it without the proper decryption key. This is crucial for protecting stored and transmitted data.
RBACcontrols user access but does not secure data in transit.
2FAstrengthens authentication but does not secure stored or transmitted data.
Patch managementfixes software vulnerabilities but does not directly protect intercepted data.
정답:
Explanation:
Confidentialityensures that sensitive information is only accessible to authorized individuals.Role-Based Access Control (RBAC)enforces confidentiality by restricting access based on a user's role within an organization, ensuring that only authorized users can view or modify certain data.
Integrityensures data is not altered improperly.
Availabilityensures access to resources but does not manage permissions.
Consistencyis not a CIA triad component.
정답:
Explanation:
Monitor mode scanningallows administrators to detect unauthorized or rogue access points broadcasting in the network. This technique, along withwireless intrusion detection systems (WIDS), helps identify and block unauthorized devices.
Requiring complex passwordsenhances security but does not prevent rogue APs.
Server-side validationsecures applications, not wireless networks.
Disallowing ICMP packetsis a security measure but does not address rogue APs.
정답:
Explanation:
ARing topologyis a network setup where each device is connected to two adjacent devices, forming a circular path for data transmission. This topology ensures that data travels in a single orbidirectional loop.
Point-to-pointtopology refers to a direct connection between two devices without forming a larger network structure.
Bus topologyhas all devices connected to a single central cable, rather than forming a ring.
Star topologyfeatures a central hub or switch that connects all devices, rather than direct device-to-device links.
정답:
Explanation:
Alaunch point attackoccurs when an attacker compromises a system and uses it as a foothold to spread malware, conduct reconnaissance, or launch further attacks against other systems. Botnets and command-and-control (C2) servers operate this way.
Denial of availabilitydisrupts service, but does not spread attacks.
Data exportsteals data instead of launching further attacks.
Data modificationchanges existing information but does not involve propagating threats.
정답:
Explanation:
Thenetstatcommand in Linux displays active network connections, listening ports, and network statistics. It is useful for diagnosing network issues and identifying open connections.
nslookupis for DNS queries.
digprovides DNS information, not network connection status.
ifconfigshows network interface details but does not list active connections.
정답:
Explanation:
Thedigcommand in Linux is used for DNS troubleshooting. It queries DNS records and provides detailed information about domain name resolutions.
traceroutetracks the path packets take to a destination but does not diagnose DNS.
netstatlists active connections, not DNS records.
ifconfigis used for managing network interfaces.
정답:
Explanation:
Phishingis a cyberattack where attackers impersonate legitimate entities (e.g., banks, companies) and send fraudulent emails or messages designed to trick recipients into revealing sensitive information, such as usernames, passwords, or financial details. The fake link in the email directs victims to a malicious site that captures their credentials.
IP address spoofingdisguises a system’s identity but does not involve email deception.
Session hijackingtakes over an active session but does not involve email scams.
Man-in-the-middle attackintercepts communication rather than tricking users via emails.
정답:
Explanation:
A broadband router is a type of network router that connects multiple computers within a local network while also providing internet access. It functions as a gateway between the local network and the internet by handling data packet transmission and routing. Broadband routers are widely used in small offices and homes because they offer essential networking services, including DHCP, NAT, and sometimes wireless connectivity.
Inter-provider border routersare used by ISPs to route data between different providers and do not serve as an internet gateway for end users.
Subscriber edge routersare typically deployed at the edge of an ISP's network to connect subscriber networks but do not provide full internet routing functionalities.
Core routersoperate at the backbone level of a network, facilitating high-speed data transfer but not connecting end-user devices directly.
정답:
Explanation:
Multifactor authentication (MFA)requires users to verify their identity usingmultiple factors, such as something they know (password), something they have (a token or phone), or somewhere they are (geolocation-based access control). Requiring both location verification andpassword authentication demonstrates MFA.
Certificate verificationchecks digital certificates for security but does not use multiple authentication factors.
User-based accountinglogs user activities but does not verify identity.
Single sign-on (SSO)allows access to multiple systems with one login but is not necessarily MFA.
정답:
Explanation:
Confidentialityprotects data from unauthorized access, includingpassive attackslike eavesdropping, wiretapping, and packet sniffing. Encryption, access controls, and secure authentication mechanisms help enforce confidentiality.
Availabilityensures uptime and system accessibility.
Integrityensures data accuracy but does not prevent interception.
Adaptationis not part of the CIA triad.
정답:
Explanation:
Infrastructure as a Service (IaaS)provides virtualized computing resources over the cloud, including virtual machines where users can install and configure their own operating systems and applications. It offers flexibility and scalability without requiring hardware investment. Examples include AWS EC2 and Microsoft Azure Virtual Machines.
FaaSexecutes small code functions without infrastructure management.
PaaSprovides a managed platform but not full OS control.
SaaSoffers ready-to-use applications without infrastructure control.