Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

Network-and-Security-Foundation Network-and-Security-Foundation Questions and Answers

Questions 4

Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to test DNS resolution against a host.

Which command in Linux should be used for this purpose?

Options:

A.

traceroute

B.

netstat

C.

dig

D.

ifconfig

Buy Now
Questions 5

An organization is the victim of an attack in which an attacker targets a computer to use as a tool to infect and target other computers in a larger attack.

What is the purpose of this attack?

Options:

A.

Denial of availability

B.

Data export

C.

Data modification

D.

Launch point

Buy Now
Questions 6

An organization has experienced rogue access points in the past and wants to take actions to mitigate this type of attack.

What should this organization do?

Options:

A.

Require complex passwords

B.

Use monitor mode scanning

C.

Use server-side validation

D.

Disallow ICMP packets on the firewall

Buy Now
Questions 7

Which CIA triad component is a driver for enabling role-based access controls?

Options:

A.

Integrity

B.

Availability

C.

Confidentiality

D.

Consistency

Buy Now
Questions 8

An attacker issues commands to access a file on a network drive and overwrite it with new data.

What is the purpose of the attack?

Options:

A.

Data modification

B.

Launch point

C.

Data export

D.

Denial of availability

Buy Now
Questions 9

A person is troubleshooting a network issue and needs to see details about network adapters and their settings.

Which Windows command should be used?

Options:

A.

ipconfig

B.

traceroute

C.

nslookup

D.

netstat

Buy Now
Questions 10

Which layer of the TCP/IP model includes the Internet Protocol (IP)?

Options:

A.

Physical or network access

B.

Application

C.

Network or internet

D.

Transport

Buy Now
Questions 11

An organization's network has been the target of several cyberattacks.

Which strategy should the organization use for Wi-Fi hardening?

Options:

A.

Implement wired equivalent privacy (WEP)

B.

Configure RADIUS authentication

C.

Implement a bus topology

D.

Avoid the use of asymmetric encryption

Buy Now
Questions 12

An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.

Which device should be used?

Options:

A.

Router

B.

Access point

C.

Server

D.

Switch

Buy Now
Questions 13

A company wants to implement a cloud service to obtain access to virtual machines. The company wants to be able to choose the operating systems and configure each of the machines.

What is the type of cloud service model that fits the needs of this company?

Options:

A.

Function as a Service (FaaS)

B.

Infrastructure as a Service (IaaS)

C.

Platform as a Service (PaaS)

D.

Software as a Service (SaaS)

Buy Now
Questions 14

A company is ensuring that its network protocol meets encryption standards.

What is the CIA triad component targeted in the scenario?

Options:

A.

Integrity

B.

Consistency

C.

Availability

D.

Confidentiality

Buy Now
Questions 15

An organization is evaluating its internal network. Currently, each device is connected to two adjacent devices, one on either side.

Which type of network topology is being used?

Options:

A.

Point-to-point

B.

Bus

C.

Star

D.

Ring

Buy Now
Questions 16

When setting up a network, a technician needs a router that connects computers together and connects computers to the internet.

Which router should be used?

Options:

A.

Inter-provider border router

B.

Subscriber edge router

C.

Broadband router

D.

Core router

Buy Now
Questions 17

A library has a network that allows patrons to use their mobile devices to connect to the internet.

Which type of network is described?

Options:

A.

SAN

B.

MAN

C.

PAN

D.

WLAN

Buy Now
Questions 18

A company is developing a disaster recovery plan for its internal network.

What is the CIA triad component targeted in the scenario?

Options:

A.

Innovation

B.

Confidentiality

C.

Availability

D.

Integrity

Buy Now
Exam Name: Network-and-Security-Foundation
Last Update: Apr 3, 2025
Questions: 62
Network-and-Security-Foundation pdf

Network-and-Security-Foundation PDF

$25.5  $84.99
Network-and-Security-Foundation Engine

Network-and-Security-Foundation Testing Engine

$30  $99.99
Network-and-Security-Foundation PDF + Engine

Network-and-Security-Foundation PDF + Testing Engine

$40.5  $134.99