WGU Related Exams
Network-and-Security-Foundation Exam

An organization's network has been the target of several cyberattacks.
Which strategy should the organization use for Wi-Fi hardening?
In order to reduce the risk of insider attacks, a company assigns role-based permissions to its users.
Which network security concept does this scenario address?
An organization is the victim of an attack in which an attacker uses a forged employee ID card to deceive a company employee into providing sensitive information.
What is the type of cyberattack described in this scenario?