FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. WGU Certification
  3. Network-and-Security-Foundation Exam
  4. WGU.Network-and-Security-Foundation.v2026-01-13.q22 Dumps
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
Download Now

Question 16

An attacker issues commands to access a file on a network drive and overwrite it with new data.
What is the purpose of the attack?

Correct Answer: A
Data modification attacksinvolve unauthorized changes to stored data, altering information to mislead, disrupt, or destroy integrity. Attackers may modify logs, transactions, or records for fraud or sabotage.
* Launch pointis when a system is used to attack others.
* Data exportis the theft of data.
* Denial of availabilitymakes data inaccessible, but does not necessarily modify it.
insert code

Question 17

When setting up a network, a technician needs a router that connects computers together and connects computers to the internet.
Which router should be used?

Correct Answer: C
A broadband router is a type of network router that connects multiple computers within a local network while also providing internet access. It functions as a gateway between the local network and the internet by handling data packet transmission and routing. Broadband routers are widely used in small offices and homes because they offer essential networking services, including DHCP, NAT, and sometimes wireless connectivity.
* Inter-provider border routersare used by ISPs to route data between different providers and do not serve as an internet gateway for end users.
* Subscriber edge routersare typically deployed at the edge of an ISP's network to connect subscriber networks but do not provide full internet routing functionalities.
* Core routersoperate at the backbone level of a network, facilitating high-speed data transfer but not connecting end-user devices directly.
insert code

Question 18

A company is developing a disaster recovery plan for its internal network.
What is the CIA triad component targeted in the scenario?

Correct Answer: C
Availabilityensures that systems and data remain accessible and operational, even in the event of failures or attacks. Adisaster recovery plan (DRP)focuses on restoring IT infrastructure and operations after incidents like hardware failures, cyberattacks, or natural disasters. Strategies include data backups, failover systems, and redundant architectures.
* Confidentialityfocuses on restricting unauthorized access.
* Integrityensures data remains unaltered, but does not address service continuity.
* Innovationis unrelated to the CIA triad.
insert code

Question 19

A company's internal messaging system is being redesigned. The authentication procedures were so cumbersome that employees were using personal email to communicate.
What is the security principle implemented in this scenario?

Correct Answer: C
Psychological acceptabilitystates that security measures should beuser-friendly and not overlyburdensome
. If security controls are too complex, users may bypass them, leading to weaker security. In this case, employees used personal email because authentication procedures were too cumbersome.
* Zero-trust modelenforces strict access control, not usability.
* Least common mechanismlimits shared resources.
* Fail-safeensures secure failure handling, not usability.
insert code

Question 20

A company wants to use a cloud service to obtain virtual machines with pre-installed and configured software.
Which cloud service model should be used?

Correct Answer: C
Platform as a Service (PaaS)provides a pre-configured computing environment that includes an operating system, runtime, and development tools, making it ideal for developers who want a ready-to-use platform.
Examples include Google App Engine and Microsoft Azure App Services.
* SaaSprovides fully hosted applications, not just pre-configured virtual machines.
* IaaSprovides infrastructure without pre-installed software.
* FaaSexecutes specific functions without persistent infrastructure.
insert code
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • »
[×]

Download PDF File

Enter your email address to download WGU.Network-and-Security-Foundation.v2026-01-13.q22 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.