Month End Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Network-and-Security-Foundation Exam Dumps - Network-and-Security-Foundation

Go to page:
Question # 4

An attacker sends emails claiming that an online account has been locked. The email provides a fake link with the goal of tricking users into providing login credentials.

Which malicious attack strategy is represented in the scenario?

A.

Phishing

B.

IP address spoofing

C.

Session hijacking

D.

Man-in-the-middle attack

Full Access
Question # 5

What is the TCP/IP layer that includes the User Datagram Protocol (UDP)?

A.

Application

B.

Network or internet

C.

Physical or network access

D.

Transport

Full Access
Question # 6

An organization has experienced injection attacks in the past and wants to take actions to mitigate this type of attack.

What should this organization do?

A.

Detect code vulnerabilities

B.

Decrease the wireless range

C.

Use server-side validation

D.

Use Wi-Fi Protected Access 2 (WPA2)

Full Access
Question # 7

An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.

Which device should be used?

A.

Router

B.

Access point

C.

Server

D.

Switch

Full Access
Question # 8

When setting up a network, a technician needs a router that creates an access point.

Which router should be used?

A.

Wireless router

B.

Broadband router

C.

Core router

D.

Inter-provider border router

Full Access
Go to page: