시험덤프
매달, 우리는 1000명 이상의 사람들이 시험 준비를 잘하고 시험을 잘 통과할 수 있도록 도와줍니다.
  / Network and Security Foundation 덤프  / Network and Security Foundation 문제 연습

WGU Network and Security Foundation 시험

Network-and-Security-Foundation 온라인 연습

최종 업데이트 시간: 2025년10월03일

당신은 온라인 연습 문제를 통해 WGU Network and Security Foundation 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.

시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 Network and Security Foundation 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 62개의 시험 문제와 답을 포함하십시오.

 / 2

Question No : 1


A company is designing an information system and is maintaining a focus on the user experience and resulting productivity rather than on the technology itself.
What is the security principle implemented in this scenario?

정답:
Explanation:
Human-centerednessin security design prioritizesuser experience and productivitywhile implementing security measures. It ensures that security policies are intuitive and do not excessively burden users, reducing resistance to security compliance.
Least common mechanismminimizes shared resources to enhance security.
Fail-safeensures secure defaults in case of system failure.
Zero-trust modelassumes no inherent trust in users or devices.

Question No : 2


A company grants users permissions based on the department in which users work.
Which type of access control is involved?

정답:
Explanation:
Role-Based Access Control (RBAC)assigns permissions based on a user's role within an organization, such as department, job function, or hierarchy. This ensures that usersonly have access to resources necessary for their duties.
Attribute-based access control (ABAC)considers dynamic attributes like time, location, and device.
Context-based access controlrestricts access based on environmental conditions.
Discretionary access control (DAC)allows data owners to determine access rights.

Question No : 3


An organization is the victim of an attack in which an attacker gains unauthorized access to a computer to steal information and forward it via the internet to another attacker.
What is the purpose of this attack?

정답:
Explanation:
This scenario describes adata exportattack, where an attacker steals sensitive information (e.g., personal data, trade secrets, or financial records) and transfers it to another entity, often for malicious purposes.
Launch pointrefers to using a compromised system for further attacks.
Denial of availabilitydisrupts access to resources.
Data modificationinvolves unauthorized changes rather than theft.

Question No : 4


An organization has experienced a series of data breaches and needs to ensure that data remains protected even if intercepted.
Which security measure should be implemented?

정답:
Explanation:
Data encryptionprotects sensitive information by encoding it into an unreadable format, ensuring that even if attackers intercept the data, they cannot decipher it without the proper decryption key. This is crucial for protecting stored and transmitted data.
RBACcontrols user access but does not secure data in transit.
2FAstrengthens authentication but does not secure stored or transmitted data.
Patch managementfixes software vulnerabilities but does not directly protect intercepted data.

Question No : 5


Which CIA triad component is a driver for enabling role-based access controls?

정답:
Explanation:
Confidentialityensures that sensitive information is only accessible to authorized individuals.Role-Based Access Control (RBAC)enforces confidentiality by restricting access based on a user's role within an organization, ensuring that only authorized users can view or modify certain data.
Integrityensures data is not altered improperly.
Availabilityensures access to resources but does not manage permissions.
Consistencyis not a CIA triad component.

Question No : 6


An organization has experienced rogue access points in the past and wants to take actions to mitigate this type of attack.
What should this organization do?

정답:
Explanation:
Monitor mode scanningallows administrators to detect unauthorized or rogue access points broadcasting in the network. This technique, along withwireless intrusion detection systems (WIDS), helps identify and block unauthorized devices.
Requiring complex passwordsenhances security but does not prevent rogue APs.
Server-side validationsecures applications, not wireless networks.
Disallowing ICMP packetsis a security measure but does not address rogue APs.

Question No : 7


An organization is evaluating its internal network. Currently, each device is connected to two adjacent devices, one on either side.
Which type of network topology is being used?

정답:
Explanation:
ARing topologyis a network setup where each device is connected to two adjacent devices, forming a circular path for data transmission. This topology ensures that data travels in a single orbidirectional loop.
Point-to-pointtopology refers to a direct connection between two devices without forming a larger network structure.
Bus topologyhas all devices connected to a single central cable, rather than forming a ring.
Star topologyfeatures a central hub or switch that connects all devices, rather than direct device-to-device links.

Question No : 8


An organization is the victim of an attack in which an attacker targets a computer to use as a tool to infect and target other computers in a larger attack.
What is the purpose of this attack?

정답:
Explanation:
Alaunch point attackoccurs when an attacker compromises a system and uses it as a foothold to spread malware, conduct reconnaissance, or launch further attacks against other systems. Botnets and command-and-control (C2) servers operate this way.
Denial of availabilitydisrupts service, but does not spread attacks.
Data exportsteals data instead of launching further attacks.
Data modificationchanges existing information but does not involve propagating threats.

Question No : 9


A person is troubleshooting a network issue and needs to see a list of all active network connections.
Which Linux command should be used?

정답:
Explanation:
Thenetstatcommand in Linux displays active network connections, listening ports, and network statistics. It is useful for diagnosing network issues and identifying open connections.
nslookupis for DNS queries.
digprovides DNS information, not network connection status.
ifconfigshows network interface details but does not list active connections.

Question No : 10


Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to test DNS resolution against a host.
Which command in Linux should be used for this purpose?

정답:
Explanation:
Thedigcommand in Linux is used for DNS troubleshooting. It queries DNS records and provides detailed information about domain name resolutions.
traceroutetracks the path packets take to a destination but does not diagnose DNS.
netstatlists active connections, not DNS records.
ifconfigis used for managing network interfaces.

Question No : 11


An attacker sends emails claiming that an online account has been locked. The email provides a fake link with the goal of tricking users into providing login credentials.
Which malicious attack strategy is represented in the scenario?

정답:
Explanation:
Phishingis a cyberattack where attackers impersonate legitimate entities (e.g., banks, companies) and send fraudulent emails or messages designed to trick recipients into revealing sensitive information, such as usernames, passwords, or financial details. The fake link in the email directs victims to a malicious site that captures their credentials.
IP address spoofingdisguises a system’s identity but does not involve email deception.
Session hijackingtakes over an active session but does not involve email scams.
Man-in-the-middle attackintercepts communication rather than tricking users via emails.

Question No : 12


When setting up a network, a technician needs a router that connects computers together and connects computers to the internet.
Which router should be used?

정답:
Explanation:
A broadband router is a type of network router that connects multiple computers within a local network while also providing internet access. It functions as a gateway between the local network and the internet by handling data packet transmission and routing. Broadband routers are widely used in small offices and homes because they offer essential networking services, including DHCP, NAT, and sometimes wireless connectivity.
Inter-provider border routersare used by ISPs to route data between different providers and do not serve as an internet gateway for end users.
Subscriber edge routersare typically deployed at the edge of an ISP's network to connect subscriber networks but do not provide full internet routing functionalities.
Core routersoperate at the backbone level of a network, facilitating high-speed data transfer but not connecting end-user devices directly.

Question No : 13


Access to a company's information system requires a user to be within a valid geographic location and to enter a valid username and password.
Which concept does this scenario demonstrate?

정답:
Explanation:
Multifactor authentication (MFA)requires users to verify their identity usingmultiple factors, such as something they know (password), something they have (a token or phone), or somewhere they are (geolocation-based access control). Requiring both location verification andpassword authentication demonstrates MFA.
Certificate verificationchecks digital certificates for security but does not use multiple authentication factors.
User-based accountinglogs user activities but does not verify identity.
Single sign-on (SSO)allows access to multiple systems with one login but is not necessarily MFA.

Question No : 14


What is an IT infrastructure security tenet of the CIA triad that counters passive attacks that aim to steal or intercept data?

정답:
Explanation:
Confidentialityprotects data from unauthorized access, includingpassive attackslike eavesdropping, wiretapping, and packet sniffing. Encryption, access controls, and secure authentication mechanisms help enforce confidentiality.
Availabilityensures uptime and system accessibility.
Integrityensures data accuracy but does not prevent interception.
Adaptationis not part of the CIA triad.

Question No : 15


A company wants to implement a cloud service to obtain access to virtual machines. The company wants to be able to choose the operating systems and configure each of the machines.
What is the type of cloud service model that fits the needs of this company?

정답:
Explanation:
Infrastructure as a Service (IaaS)provides virtualized computing resources over the cloud, including virtual machines where users can install and configure their own operating systems and applications. It offers flexibility and scalability without requiring hardware investment. Examples include AWS EC2 and Microsoft Azure Virtual Machines.
FaaSexecutes small code functions without infrastructure management.
PaaSprovides a managed platform but not full OS control.
SaaSoffers ready-to-use applications without infrastructure control.

 / 2
WGU