WGU Network-and-Security-Foundation Exam (page: 1)
WGU Network Engineering and Security Foundation
Updated on: 24-Mar-2026

When setting up a network, a technician needs a router that connects computers together and connects computers to the internet.

Which router should be used?

  1. Inter-provider border router
  2. Subscriber edge router
  3. Broadband router
  4. Core router

Answer(s): C

Explanation:

A broadband router is a type of network router that connects multiple computers within a local network while also providing internet access. It functions as a gateway between the local network and the internet by handling data packet transmission and routing. Broadband routers are widely used in small offices and homes because they offer essential networking services, including DHCP, NAT, and sometimes wireless connectivity.

Inter-provider border routers are used by ISPs to route data between different providers and do not serve as an internet gateway for end users.

Subscriber edge routers are typically deployed at the edge of an ISP's network to connect subscriber networks but do not provide full internet routing functionalities.

Core routers operate at the backbone level of a network, facilitating high-speed data transfer but not connecting end-user devices directly.



When setting up a network, a technician needs a router that creates an access point.

Which router should be used?

  1. Wireless router
  2. Broadband router
  3. Core router
  4. Inter-provider border router

Answer(s): A

Explanation:

A wireless router is designed to create an access point that allows wireless devices to connect to a network. It combines the functions of a traditional router with a wireless access point, enabling communication between wired and wireless devices. These routers use Wi-Fi standards (e.g., 802.11ac, 802.11ax) to transmit data wirelessly.

Broadband routers primarily provide internet connectivity but do not necessarily include Wi-Fi functionality unless specified.

Core routers handle large-scale data routing in the backbone of networks but are not designed for access point creation.

Inter-provider border routers function at an ISP level for routing traffic between different networks, not for providing user access.



An individual has been tasked with setting up an office network. During the process, there is a need for a device that extends the range of a network.

Which device should be used?

  1. Router
  2. Access point
  3. Server
  4. Switch

Answer(s): B

Explanation:

An access point (AP) is a network device that extends the coverage of a wireless network by acting as a bridge between wired and wireless devices. It allows users to connect to a network without needing a direct wired connection. APs are particularly useful in large office spaces where Wi-Fi signals may not reach all areas.

Routers primarily manage network traffic but do not directly extend network range unless they include built-in AP functionality.

Servers are used for hosting applications and storing data but do not extend network connectivity.

Switches connect wired devices within a local network but do not extend wireless network range.



A library has a network that allows patrons to use their mobile devices to connect to the internet.

Which type of network is described?

  1. SAN
  2. MAN
  3. PAN
  4. WLAN

Answer(s): D

Explanation:

A Wireless Local Area Network (WLAN) enables wireless connectivity within a defined geographic area, such as a library, office, or coffee shop. WLANs use Wi-Fi technology to allow users to access the internet without physical cables.

Storage Area Networks (SANs) are used for data storage and do not provide internet connectivity to users.

Metropolitan Area Networks (MANs) cover larger areas, such as cities, and are not used within a single building.

Personal Area Networks (PANs) connect personal devices like smartphones and laptops over short distances, such as via Bluetooth, but do not support public internet access.



An organization is evaluating its internal network. Currently, each device is connected to two adjacent devices, one on either side.

Which type of network topology is being used?

  1. Point-to-point
  2. Bus
  3. Star
  4. Ring

Answer(s): D

Explanation:

A Ring topology is a network setup where each device is connected to two adjacent devices, forming a circular path for data transmission. This topology ensures that data travels in a single or bidirectional loop.

Point-to-point topology refers to a direct connection between two devices without forming a larger network structure.

Bus topology has all devices connected to a single central cable, rather than forming a ring.

Star topology features a central hub or switch that connects all devices, rather than direct device-to- device links.



A company has a legacy network in which all devices receive all messages transmitted by a central wire.

Which network topology is described?

  1. Star
  2. Point-to-point
  3. Bus
  4. Ring

Answer(s): C

Explanation:

A Bus topology is a network setup in which all devices share a single communication channel (central wire), and data is transmitted along this cable. Each device listens for data but only processes packets addressed to it. This topology was widely used in older Ethernet networks.

Star topology uses a central switch or hub, not a shared wire.

Point-to-point topology involves a direct link between two devices, not multiple devices sharing a medium.

Ring topology connects each device to two adjacent devices in a circular path, not a single shared bus.



A person is troubleshooting a network issue and needs to see details about network adapters and their settings.

Which Windows command should be used?

  1. ipconfig
  2. traceroute
  3. nslookup
  4. netstat

Answer(s): A

Explanation:

The ipconfig command in Windows provides details about a computer's network adapters, including IP addresses, subnet masks, default gateways, and DNS settings. It is particularly useful for troubleshooting connectivity issues.

traceroute (or tracert in Windows) is used to trace the path packets take to a destination.

nslookup is used for querying DNS records.

netstat provides details about active network connections and listening ports, but not adapter configurations.



In the process of setting up a Linux-based network system, a technician needs to determine if there is connectivity to a hostname.

Which command should be used?

  1. ping
  2. nslookup
  3. ifconfig
  4. dig

Answer(s): A

Explanation:

The ping command in Linux is used to check network connectivity to a specific hostname or IP address. It sends ICMP Echo Request packets and measures response times.

nslookup is used for DNS lookups, not connectivity testing.

ifconfig displays network interface configurations but does not test connectivity.

dig is used for detailed DNS queries.



Viewing Page 1 of 9



Share your comments for WGU Network-and-Security-Foundation exam with other users:

Srijeeta 10/8/2023 6:24:00 AM

how do i get the remaining questions?
INDIA


Jovanne 7/26/2022 11:42:00 PM

well formatted pdf and the test engine software is free. well worth the money i sept.
ITALY


CHINIMILLI SATISH 8/29/2023 6:22:00 AM

looking for 1z0-116
Anonymous


Pedro Afonso 1/15/2024 8:01:00 AM

in question 22, shouldnt be in the data (option a) layer?
Anonymous


Pushkar 11/7/2022 12:12:00 AM

the questions are incredibly close to real exam. you people are amazing.
INDIA


Ankit S 11/13/2023 3:58:00 AM

q15. answer is b. simple
UNITED STATES


S. R 12/8/2023 9:41:00 AM

great practice
FRANCE


Mungara 3/14/2023 12:10:00 AM

thanks to this exam dumps, i felt confident and passed my exam with ease.
UNITED STATES


Anonymous 7/25/2023 2:55:00 AM

need 1z0-1105-22 exam
Anonymous


Nigora 5/31/2022 10:05:00 PM

this is a beautiful tool. passed after a week of studying.
UNITED STATES


Av dey 8/16/2023 2:35:00 PM

can you please upload the dumps for 1z0-1096-23 for oracle
INDIA


Mayur Shermale 11/23/2023 12:22:00 AM

its intresting, i would like to learn more abouth this
JAPAN


JM 12/19/2023 2:23:00 PM

q252: dns poisoning is the correct answer, not locator redirection. beaconing is detected from a host. this indicates that the system has been infected with malware, which could be the source of local dns poisoning. location redirection works by either embedding the redirection in the original websites code or having a user click on a url that has an embedded redirect. since users at a different office are not getting redirected, it isnt an embedded redirection on the original website and since the user is manually typing in the url and not clicking a link, it isnt a modified link.
UNITED STATES


Freddie 12/12/2023 12:37:00 PM

helpful dump questions
SOUTH AFRICA


Da Costa 8/25/2023 7:30:00 AM

question 423 eigrp uses metric
Anonymous


Bsmaind 8/20/2023 9:22:00 AM

hello nice dumps
Anonymous


beau 1/12/2024 4:53:00 PM

good resource for learning
UNITED STATES


Sandeep 12/29/2023 4:07:00 AM

very useful
Anonymous


kevin 9/29/2023 8:04:00 AM

physical tempering techniques
Anonymous


Blessious Phiri 8/15/2023 4:08:00 PM

its giving best technical knowledge
Anonymous


Testbear 6/13/2023 11:15:00 AM

please upload
ITALY


shime 10/24/2023 4:23:00 AM

great question with explanation thanks!!
ETHIOPIA


Thembelani 5/30/2023 2:40:00 AM

does this exam have lab sections?
Anonymous


Shin 9/8/2023 5:31:00 AM

please upload
PHILIPPINES


priti kagwade 7/22/2023 5:17:00 AM

please upload the braindump for .net
UNITED STATES


Robe 9/27/2023 8:15:00 PM

i need this exam 1z0-1107-2. please.
Anonymous


Chiranthaka 9/20/2023 11:22:00 AM

very useful!
Anonymous


Not Miguel 11/26/2023 9:43:00 PM

for this question - "which three type of basic patient or member information is displayed on the patient info component? (choose three.)", list of conditions is not displayed (it is displayed in patient card, not patient info). so should be thumbnail of chatter photo
Anonymous


Andrus 12/17/2023 12:09:00 PM

q52 should be d. vm storage controller bandwidth represents the amount of data (in terms of bandwidth) that a vms storage controller is using to read and write data to the storage fabric.
Anonymous


Raj 5/25/2023 8:43:00 AM

nice questions
UNITED STATES


max 12/22/2023 3:45:00 PM

very useful
Anonymous


Muhammad Rawish Siddiqui 12/8/2023 6:12:00 PM

question # 208: failure logs is not an example of operational metadata.
SAUDI ARABIA


Sachin Bedi 1/5/2024 4:47:00 AM

good questions
Anonymous


Kenneth 12/8/2023 7:34:00 AM

thank you for the test materials!
KOREA REPUBLIC OF