FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. WGU Certification
  3. Network-and-Security-Foundation Exam
  4. WGU.Network-and-Security-Foundation.v2026-01-13.q22 Dumps
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
Download Now

Question 21

An organization is the victim of an attack in which an attacker intercepts messages between two parties before transferring them to the correct destination.
What is the type of cyberattack described in this scenario?

Correct Answer: D
Aman-in-the-middle (MITM) attackoccurs when an attacker secretly intercepts and relays communication between two parties. This allows the attacker to steal data, modify messages, or inject malicious content without the victims' knowledge.
* Credential stuffingreuses stolen login credentials but does not involve interception.
* Social engineeringmanipulates users rather than intercepting messages.
* Pharmingredirects users to fraudulent websites, but it does not intercept communication.
insert code

Question 22

What is the component of the CIA triad for IT security that requires that IP packets be retransmitted if the receiving host has an invalid checksum value?

Correct Answer: D
Integrityin theCIA (Confidentiality, Integrity, Availability) triadensures that data is not altered in an unauthorized manner. In networking, integrity mechanisms such as checksums, message authentication codes (MACs), and digital signatures verify that transmitted data has not been tampered with. If an IP packet has an invalid checksum, the system detects corruption and requests retransmission, ensuring data integrity.
* Confidentialityprotects against unauthorized access but does not ensure data consistency.
* Availabilityensures that resources are accessible but does not verify data correctness.
* Consistencyis not a formal component of the CIA triad.
insert code
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
[×]

Download PDF File

Enter your email address to download WGU.Network-and-Security-Foundation.v2026-01-13.q22 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.