WGU Related Exams
Network-and-Security-Foundation Exam

A computer network has software that tracks successful and unsuccessful connection attempts to the network in order to better identify attacks.
Which network security concept does this scenario address?
Which CIA triad component is a driver for enabling role-based access controls?
In the process of setting up a Linux-based network system, a technician needs to determine if there is connectivity to a hostname.
Which command should be used?