Special Summer Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

Network-and-Security-Foundation Network-and-Security-Foundation Questions and Answers

Questions 4

What is the TCP/IP layer that includes the User Datagram Protocol (UDP)?

Options:

A.

Application

B.

Network or internet

C.

Physical or network access

D.

Transport

Buy Now
Questions 5

Which component of the IT securityCIA triadis a driver for enabling data encryption?

Options:

A.

Application

B.

Integrity

C.

Confidentiality

D.

Availability

Buy Now
Questions 6

An organization is the victim of an attack in which an attacker gains unauthorized access to a computer to steal information and forward it via the internet to another attacker.

What is the purpose of this attack?

Options:

A.

Launch point

B.

Denial of availability

C.

Data export

D.

Data modification

Buy Now
Questions 7

A company wants to implement virtual machines with a focus on security and efficiency.

Which type of hypervisor fits the need described in the scenario?

Options:

A.

Open source

B.

Proprietary

C.

Type 1

D.

Type 2

Buy Now
Questions 8

An organization has experienced injection attacks in the past and wants to take actions to mitigate this type of attack.

What should this organization do?

Options:

A.

Detect code vulnerabilities

B.

Decrease the wireless range

C.

Use server-side validation

D.

Use Wi-Fi Protected Access 2 (WPA2)

Buy Now
Questions 9

What is an IT infrastructure security tenet of the CIA triad that counters passive attacks that aim to steal or intercept data?

Options:

A.

Adaptation

B.

Confidentiality

C.

Availability

D.

Integrity

Buy Now
Questions 10

An attacker changes a computer's identification to appear as an authorized computer in a target network.

Which type of cyberattack is described?

Options:

A.

Pharming

B.

Man-in-the-middle attack

C.

Session hijacking

D.

IP address spoofing

Buy Now
Questions 11

An organization is updating its information security policies in order to comply with thePersonal Information Protection and Electronic Documents Act (PIPEDA).

What should this organization expect to be required under this legislation?

Options:

A.

Securely dispose of personally identifiable information

B.

Compensate individuals for revenue from the sale of their information

C.

Notify individuals each time their personal information is viewed

D.

Disclose the software used to protect personal data

Buy Now
Questions 12

A person is troubleshooting a network issue and needs to see details about network adapters and their settings.

Which Windows command should be used?

Options:

A.

ipconfig

B.

traceroute

C.

nslookup

D.

netstat

Buy Now
Questions 13

What is a CIA triad component that involves keeping systems accessible for network users?

Options:

A.

Availability

B.

Innovation

C.

Integrity

D.

Confidentiality

Buy Now
Questions 14

What is the layer of the OSI model that creates, maintains, and disconnects process communications over the network?

Options:

A.

Data link

B.

Physical

C.

Session

D.

Transport

Buy Now
Questions 15

An organization is the victim of an attack in which an attacker targets a computer to use as a tool to infect and target other computers in a larger attack.

What is the purpose of this attack?

Options:

A.

Denial of availability

B.

Data export

C.

Data modification

D.

Launch point

Buy Now
Questions 16

With expanded business opportunities and markets, a company needs to comply with theGeneral Data Protection Regulation (GDPR).

Which requirement should be expected for the company under this regulation?

Options:

A.

Allow individuals to access, collect, or erase their personal information

B.

Compensate individuals for revenue from the sale of their information

C.

Disclose the software used to protect personal data

D.

Notify individuals each time their personal information is viewed

Buy Now
Questions 17

An organization has experienced a series of data breaches and needs to ensure that data remains protected even if intercepted.

Which security measure should be implemented?

Options:

A.

Role-based access control (RBAC)

B.

Two-factor authentication (2FA)

C.

Data encryption

D.

Patch management

Buy Now
Questions 18

In order to reduce the risk of insider attacks, a company assigns role-based permissions to its users.

Which network security concept does this scenario address?

Options:

A.

Authentication

B.

Accounting

C.

Availability

D.

Authorization

Buy Now
Exam Name: Network-and-Security-Foundation
Last Update: Mar 29, 2025
Questions: 62

PDF + Testing Engine

$49.5  $164.99

Testing Engine

$37.5  $124.99
buy now Network-and-Security-Foundation testing engine

PDF (Q&A)

$31.5  $104.99
buy now Network-and-Security-Foundation pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 04 Apr 2025