Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

WGU C836 CERTIFICATION SCRIPT 2026 COMPLETE QUESTIONS AND CORRECT ANSWERS

Puntuación
-
Vendido
-
Páginas
31
Grado
A+
Subido en
27-03-2026
Escrito en
2025/2026

WGU C836 CERTIFICATION SCRIPT 2026 COMPLETE QUESTIONS AND CORRECT ANSWERS

Institución
WGU C836
Grado
WGU C836

Vista previa del contenido

WGU C836 CERTIFICATION SCRIPT 2026
COMPLETE QUESTIONS AND CORRECT
ANSWERS


◉network segmentation. Answer: The act of dividing a network into
multiple smaller networks, each acting as its own small network
(subnet)


◉choke points. Answer: certain points in the network, such as
routers, firewalls, or proxies, where we can inspect, filter, and
control network traffic


◉redundancy. Answer: a method of security that involves designing
a network to always have another route if something fails or loses
connection


◉firewall. Answer: a mechanism for maintaining control over the
traffic that flows into and out of our networks


◉packet filtering. Answer: A firewall technology that inspects the
contents of each packet in network traffic individually and makes a
gross determination (based on source and destination IP address,

,port number, and the protocol being used) of whether the traffic
should be allowed to pass


◉SPI (Stateful Packet Inspection). Answer: a firewall that can watch
packets and monitor the traffic from a given connection


◉DPI (Deep Packet Inspection). Answer: a firewall technology that
can analyze the actual content of the traffic that is flowing through


◉proxy server. Answer: a specialized type of firewall that can serve
as a choke point, log traffic for later inspection, and provides a layer
of security by serving as a single source of requests for the devices
behind it


◉DMZ (demilitarized zone). Answer: a combination of a network
design feature and a protective device such as a firewall.
Often used for systems that need to be exposed to external networks
but are connected to our own network (such as a web server)


◉NIDS (Network intrusion detection system). Answer: A system
that monitors network traffic and alerts for unauthorized activity


◉signature-based IDS. Answer: An IDS that maintains a database of
signatures that might signal a particular type of attack and compares
incoming traffic to those signatures

,◉anomaly-based IDS. Answer: an IDS that takes a baseline of normal
network traffic and activity and measures current traffic against this
baseline to detect unusual events


◉VPN (Virtual Private Network). Answer: an encrypted connection
between two points


◉SSH (Secure Shell). Answer: protocol used to secure traffic in a
variety of ways, including file transfers and terminal access. uses
RSA encryption (asymmetric encryption)


◉BYOD (bring your own device). Answer: a phrase that refers to an
organization's strategy and policies regarding the use of personal vs.
corporate devices


◉MDM (mobile device management). Answer: a solution that
manages security elements for mobile devices in the workplace


◉kismet. Answer: a well-known Linux sniffing tool used to detect
wireless access points


◉NetStumbler. Answer: A Windows tool used to detect wireless
access points

, ◉nmap. Answer: A well-known port scanner that can also search for
hosts on a network, identify the operating systems those hosts are
running, detect the version of the services running on any open
ports, and more


◉packet sniffer (aka network or protocol analyzer). Answer: this
type of tool can intercept traffic on a network;
listens for any traffic that the network interface of our computer or
device can see


◉tcpdump (WinDump for Windows). Answer: classic, command-
line sniffing tool that monitors network activities, filters traffic, and
more
runs on UNIX systems


◉Wireshark. Answer: a graphical interface protocol sniffing tool that
is capable of filtering, sorting, & analyzing both wired and wireless
traffic
- popular troubleshooting tool


◉honeypot. Answer: A type of tool that deliberately displays
vulnerabilities or attractive data so it can detect, monitor, and
sometimes tamper with the activities of an attacker

Escuela, estudio y materia

Institución
WGU C836
Grado
WGU C836

Información del documento

Subido en
27 de marzo de 2026
Número de páginas
31
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$12.99
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
FocusFile7 Harvard University
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
97
Miembro desde
9 meses
Número de seguidores
4
Documentos
32999
Última venta
9 horas hace
FocusFile7

Welcome to FocusFile, your inspiring hub for academic excellence! Just like your favorite café where every sip brings comfort, FocusFile is designed to be your go to space for clear thinking, deep focus, and study success. Here at FocusFile, I believe learning isn’t just about cramming it’s about clarity, growth, and building the confidence to conquer any challenge. That’s why you’ll find a handpicked collection of top notch, easy to digest study materials, smart summaries, and guides tailored to a wide range of subjects and learning styles. Whether you're gearing up for exams, brushing up on class notes, or just need that extra push, FocusFile has you covered. From quick-reference sheets to deep-dive notes, there’s something here for every learner whether you're a visual thinker, a bullet-point lover, or someone who thrives on quick, impactful insights. Think of FocusFile as your academic sanctuary, a place where productivity meets peace of mind. So grab your favorite drink, settle in, and let’s sharpen your focus and fuel your success, one file at a time. Thanks for making FocusFile your study partner. Let’s unlock your full potential together!

Lee mas Leer menos
3.6

14 reseñas

5
4
4
3
3
6
2
0
1
1

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes