Special Summer Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

Network-and-Security-Foundation Sample Questions Answers

Questions 4

An organization's network has been the target of several cyberattacks.

Which strategy should the organization use for Wi-Fi hardening?

Options:

A.

Trust local hosts by default

B.

Disable ESSID broadcasting

C.

Add more access points

D.

Implement wired equivalent privacy (WEP)

Buy Now
Questions 5

A company is specifically worried about buffer overflow attacks.

Which strategy should be used as a mitigation against this type of attack?

Options:

A.

Detect code vulnerabilities

B.

Disable caching

C.

Use server-side validation

D.

Implement intrusion protection software

Buy Now
Questions 6

A company has a legacy network in which all devices receive all messages transmitted by a central wire.

Which network topology is described?

Options:

A.

Star

B.

Point-to-point

C.

Bus

D.

Ring

Buy Now
Questions 7

Which CIA triad component is a driver for enabling role-based access controls?

Options:

A.

Integrity

B.

Availability

C.

Confidentiality

D.

Consistency

Buy Now
Questions 8

What is an IT infrastructure security tenet of the CIA triad that counters passive attacks that aim to steal or intercept data?

Options:

A.

Adaptation

B.

Confidentiality

C.

Availability

D.

Integrity

Buy Now
Questions 9

Which layer of the OSI model includes the TCP?

Options:

A.

Application

B.

Transport

C.

Session

D.

Network

Buy Now
Questions 10

Which layer of the TCP/IP model includes the Internet Protocol (IP)?

Options:

A.

Physical or network access

B.

Application

C.

Network or internet

D.

Transport

Buy Now
Questions 11

An attacker uses a network device to take over an existing connection between two network computers.

Which malicious attack strategy is represented in the scenario?

Options:

A.

Dictionary attack

B.

Social engineering

C.

Session hijacking

D.

IP address spoofing

Buy Now
Questions 12

An organization has experienced a series of data breaches and needs to ensure that data remains protected even if intercepted.

Which security measure should be implemented?

Options:

A.

Role-based access control (RBAC)

B.

Two-factor authentication (2FA)

C.

Data encryption

D.

Patch management

Buy Now
Questions 13

A developer is using shared functions for software code in order to reduce complexity, knowing that greater complexity and volume of code are harder to defend against attacks.

Which security principle is demonstrated in this scenario?

Options:

A.

Economy of mechanism

B.

Least common mechanism

C.

Least privilege

D.

Zero-trust model

Buy Now
Questions 14

A company wants to implement virtual machines with a focus on security and efficiency.

Which type of hypervisor fits the need described in the scenario?

Options:

A.

Open source

B.

Proprietary

C.

Type 1

D.

Type 2

Buy Now
Questions 15

After a series of attacks, an organization needs to bolster its data protection measures.

Which strategy should be used to increase data protection?

Options:

A.

Use a variable network topology

B.

Have restoration policies in place

C.

Require that passwords change weekly

D.

Implement wired equivalent privacy (WEP)

Buy Now
Questions 16

Access to a company's information system requires a user to be within a valid geographic location and to enter a valid username and password.

Which concept does this scenario demonstrate?

Options:

A.

Certificate verification

B.

Multifactor authentication

C.

User-based accounting

D.

Single sign-on

Buy Now
Questions 17

An attacker changes a computer's identification to appear as an authorized computer in a target network.

Which type of cyberattack is described?

Options:

A.

Pharming

B.

Man-in-the-middle attack

C.

Session hijacking

D.

IP address spoofing

Buy Now
Questions 18

A company is developing a disaster recovery plan for its internal network.

What is the CIA triad component targeted in the scenario?

Options:

A.

Innovation

B.

Confidentiality

C.

Availability

D.

Integrity

Buy Now
Exam Code: Network-and-Security-Foundation
Exam Name: Network-and-Security-Foundation
Last Update: Apr 2, 2025
Questions: 62
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now Network-and-Security-Foundation