Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

Network-and-Security-Foundation Network-and-Security-Foundation Questions and Answers

Questions 4

A company is developing a disaster recovery plan for its internal network.

What is the CIA triad component targeted in the scenario?

Options:

A.

Innovation

B.

Confidentiality

C.

Availability

D.

Integrity

Buy Now
Questions 5

Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to test DNS resolution against a host.

Which command in Linux should be used for this purpose?

Options:

A.

traceroute

B.

netstat

C.

dig

D.

ifconfig

Buy Now
Questions 6

What is a CIA triad component that involves keeping systems accessible for network users?

Options:

A.

Availability

B.

Innovation

C.

Integrity

D.

Confidentiality

Buy Now
Questions 7

A start-up company wants to build its computer network by starting with the base-level resources offered by a cloud service. In this way, the company won't have to buy physical hardware but canstill have complete control over operating systems and other software.

Which cloud service model should be used?

Options:

A.

Software as a Service (SaaS)

B.

Function as a Service (FaaS)

C.

Infrastructure as a Service (IaaS)

D.

Platform as a Service (PaaS)

Buy Now
Questions 8

A company is specifically worried about rogue access points.

Which strategy should be used as a mitigation against this type of attack?

Options:

A.

Decrease the wireless range

B.

Disable unnecessary services

C.

Configure switch port tracing

D.

Monitor normal traffic patterns

Buy Now
Questions 9

A company is ensuring that its network protocol meets encryption standards.

What is the CIA triad component targeted in the scenario?

Options:

A.

Integrity

B.

Consistency

C.

Availability

D.

Confidentiality

Buy Now
Questions 10

Which statement describes the Integrity tenet of IT security?

Options:

A.

It involves transmitting network data without any errors.

B.

It requires the encryption of sensitive data transmission.

C.

It requires that network applications be accessible to users.

D.

It involves keeping systems accessible for network users.

Buy Now
Questions 11

An attacker uses malicious software to disable network resources, demanding a ransom to restore access.

Which category describes the purpose of the attack?

Options:

A.

Data modification

B.

Denial of availability

C.

Data export

D.

Launch point

Buy Now
Questions 12

A company wants to implement a cloud service to obtain access to virtual machines. The company wants to be able to choose the operating systems and configure each of the machines.

What is the type of cloud service model that fits the needs of this company?

Options:

A.

Function as a Service (FaaS)

B.

Infrastructure as a Service (IaaS)

C.

Platform as a Service (PaaS)

D.

Software as a Service (SaaS)

Buy Now
Questions 13

An organization has experienced injection attacks in the past and wants to take actions to mitigate this type of attack.

What should this organization do?

Options:

A.

Detect code vulnerabilities

B.

Decrease the wireless range

C.

Use server-side validation

D.

Use Wi-Fi Protected Access 2 (WPA2)

Buy Now
Questions 14

A company is developing a data protection methodology in order to improve data protection measures.

What is a strategy that should be used?

Options:

A.

Use a variable network topology

B.

Increase wireless access point range

C.

Enhance physical resource security

D.

Implement wired equivalent privacy (WEP)

Buy Now
Questions 15

Which layer of the OSI model includes the TCP?

Options:

A.

Application

B.

Transport

C.

Session

D.

Network

Buy Now
Questions 16

Which layer of the OSI model includes the ICMP?

Options:

A.

Transport

B.

Session

C.

Network

D.

Application

Buy Now
Questions 17

An organization is the victim of an attack in which an attacker targets a computer to use as a tool to infect and target other computers in a larger attack.

What is the purpose of this attack?

Options:

A.

Denial of availability

B.

Data export

C.

Data modification

D.

Launch point

Buy Now
Questions 18

An organization is the victim of an attack in which an attacker intercepts messages between two parties before transferring them to the correct destination.

What is the type of cyberattack described in this scenario?

Options:

A.

Credential stuffing

B.

Social engineering

C.

Pharming

D.

Man-in-the-middle attack

Buy Now
Exam Name: Network-and-Security-Foundation
Last Update: Sep 12, 2025
Questions: 62

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99