Special Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Network-and-Security-Foundation Network-and-Security-Foundation Questions and Answers

Questions 4

Which CIA triad component is a driver for enabling role-based access controls?

Options:

A.

Integrity

B.

Availability

C.

Confidentiality

D.

Consistency

Buy Now
Questions 5

After recently experiencing a security breach, a company is working on improving its database security. As a part of its security governance strategies, the company is developing a database security checklist.

Which component is important to include in this checklist?

Options:

A.

Disclosing any instances of breaches of personal data

B.

Restricting physical access to locations where data is housed

C.

Developing algorithms for secure access to data

D.

Outsourcing data management to third-party vendors

Buy Now
Questions 6

Which component of the IT securityCIA triadis a driver for enabling data encryption?

Options:

A.

Application

B.

Integrity

C.

Confidentiality

D.

Availability

Buy Now
Questions 7

When setting up a network, a technician needs a router that creates an access point.

Which router should be used?

Options:

A.

Wireless router

B.

Broadband router

C.

Core router

D.

Inter-provider border router

Buy Now
Questions 8

What is a CIA triad component that involves keeping systems accessible for network users?

Options:

A.

Availability

B.

Innovation

C.

Integrity

D.

Confidentiality

Buy Now
Questions 9

A company is specifically worried about buffer overflow attacks.

Which strategy should be used as a mitigation against this type of attack?

Options:

A.

Detect code vulnerabilities

B.

Disable caching

C.

Use server-side validation

D.

Implement intrusion protection software

Buy Now
Questions 10

In order to reduce the risk of insider attacks, a company assigns role-based permissions to its users.

Which network security concept does this scenario address?

Options:

A.

Authentication

B.

Accounting

C.

Availability

D.

Authorization

Buy Now
Questions 11

An organization's network has been the target of several cyberattacks.

Which strategy should the organization use for Wi-Fi hardening?

Options:

A.

Implement wired equivalent privacy (WEP)

B.

Configure RADIUS authentication

C.

Implement a bus topology

D.

Avoid the use of asymmetric encryption

Buy Now
Questions 12

A company has a legacy network in which all devices receive all messages transmitted by a central wire.

Which network topology is described?

Options:

A.

Star

B.

Point-to-point

C.

Bus

D.

Ring

Buy Now
Questions 13

An organization does not have controls in place to limit employee access to sensitive customer data.

What is a component of the CIA triad that is violated?

Options:

A.

Confidentiality

B.

Integrity

C.

Availability

D.

Interpretation

Buy Now
Questions 14

A person is troubleshooting a network issue and needs to see a list of all active network connections.

Which Linux command should be used?

Options:

A.

nslookup

B.

netstat

C.

dig

D.

ifconfig

Buy Now
Questions 15

An attacker changes a computer's identification to appear as an authorized computer in a target network.

Which type of cyberattack is described?

Options:

A.

Pharming

B.

Man-in-the-middle attack

C.

Session hijacking

D.

IP address spoofing

Buy Now
Questions 16

A company is developing a data protection methodology in order to improve data protection measures.

What is a strategy that should be used?

Options:

A.

Use a variable network topology

B.

Increase wireless access point range

C.

Enhance physical resource security

D.

Implement wired equivalent privacy (WEP)

Buy Now
Questions 17

Which layer of the TCP/IP model includes the Internet Protocol (IP)?

Options:

A.

Physical or network access

B.

Application

C.

Network or internet

D.

Transport

Buy Now
Questions 18

A company is ensuring that its network protocol meets encryption standards.

What is the CIA triad component targeted in the scenario?

Options:

A.

Integrity

B.

Consistency

C.

Availability

D.

Confidentiality

Buy Now
Exam Name: Network-and-Security-Foundation
Last Update: Apr 2, 2025
Questions: 62

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now Network-and-Security-Foundation testing engine

PDF (Q&A)

$36.75  $104.99
buy now Network-and-Security-Foundation pdf