Pass4Future also provide interactive practice exam software for preparing WGU Network Engineering and Security Foundation (Network and Security Foundation) Exam effectively. You are welcome to explore sample free WGU Network and Security Foundation Exam questions below and also try WGU Network and Security Foundation Exam practice test software.
Do you know that you can access more real WGU Network-and-Security-Foundation exam questions via Premium Access? ()
An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.
Which device should be used?
Answer : B
An access point (AP) is a network device that extends the coverage of a wireless network by acting as a bridge between wired and wireless devices. It allows users to connect to a network without needing a direct wired connection. APs are particularly useful in large office spaces where Wi-Fi signals may not reach all areas.
Routers primarily manage network traffic but do not directly extend network range unless they include built-in AP functionality.
Servers are used for hosting applications and storing data but do not extend network connectivity.
Switches connect wired devices within a local network but do not extend wireless network range.
An organization's network has been the target of several cyberattacks.
Which strategy should the organization use for Wi-Fi hardening?
Answer : B
Configuring RADIUS authentication enhances Wi-Fi security by requiring user authentication before granting access to the network. This prevents unauthorized users from connecting and mitigates risks from rogue access points.
WEP is outdated and insecure; WPA2/WPA3 with RADIUS should be used instead.
A bus topology is a network design choice, not a security measure.
Avoiding asymmetric encryption weakens security rather than improving it.
Which scenario demonstrates a violation of the integrity component of the CIA triad?
Answer : B
A violation of integrity occurs when data is modified incorrectly, whether intentionally or by accident. In this case, an employee modifying a customer account incorrectly demonstrates a breach of data integrity.
A and C relate to availability, as they describe system downtime.
D relates to confidentiality, as it describes improper data protection.
A company is specifically worried about rogue access points.
Which strategy should be used as a mitigation against this type of attack?
Answer : C
Configuring switch port tracing helps detect unauthorized devices, such as rogue access points, that are connected to the network. Network administrators can use port security and intrusion detection systems (IDS) to monitor and block unauthorized access points.
Decreasing wireless range may limit exposure but does not actively detect rogue APs.
Disabling unnecessary services improves security but does not prevent rogue APs.
Monitoring traffic patterns helps detect anomalies but does not directly stop rogue APs.
An attacker changes a computer's identification to appear as an authorized computer in a target network.
Which type of cyberattack is described?
Answer : D
IP address spoofing is a cyberattack where an attacker disguises their system by falsifying its IP address, making it appear as a trusted device in a network. This technique is used for bypassing security controls, launching denial-of-service (DoS) attacks, or impersonating legitimate users.
Pharming redirects users to fake websites to steal credentials.
Man-in-the-middle attack intercepts communications between two parties.
Session hijacking takes over an active session but does not involve falsifying an IP address.