Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Network-and-Security-Foundation

Last Update 21 hours ago Total Questions : 62

The Network-and-Security-Foundation content is now fully updated, with all current exam questions added 21 hours ago. Deciding to include Network-and-Security-Foundation practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our Network-and-Security-Foundation exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these Network-and-Security-Foundation sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Network-and-Security-Foundation practice test comfortably within the allotted time.

Question # 4

Which statement describes the Integrity tenet of IT security?

A.

It involves transmitting network data without any errors.

B.

It requires the encryption of sensitive data transmission.

C.

It requires that network applications be accessible to users.

D.

It involves keeping systems accessible for network users.

Question # 5

After a series of attacks, an organization needs to bolster its data protection measures.

Which strategy should be used to increase data protection?

A.

Use a variable network topology

B.

Have restoration policies in place

C.

Require that passwords change weekly

D.

Implement wired equivalent privacy (WEP)

Question # 6

An organization does not have controls in place to limit employee access to sensitive customer data.

What is a component of the CIA triad that is violated?

A.

Confidentiality

B.

Integrity

C.

Availability

D.

Interpretation

Question # 7

In order to reduce the risk of insider attacks, a company assigns role-based permissions to its users.

Which network security concept does this scenario address?

A.

Authentication

B.

Accounting

C.

Availability

D.

Authorization

Question # 8

When setting up a network, a technician needs a router that connects computers together and connects computers to the internet.

Which router should be used?

A.

Inter-provider border router

B.

Subscriber edge router

C.

Broadband router

D.

Core router

Question # 9

An attacker uses a list of commonly used access credentials to attempt to gain access to an online account.

Which malicious attack strategy is represented in the scenario?

A.

Phishing

B.

Dictionary attack

C.

Credential stuffing

D.

Social engineering

Question # 10

An attacker uses malicious software to disable network resources, demanding a ransom to restore access.

Which category describes the purpose of the attack?

A.

Data modification

B.

Denial of availability

C.

Data export

D.

Launch point

Go to page: