100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D315 - PRE-ASSESSMENT: NETWORK AND SECURITY - FOUNDATIONS

Beoordeling
-
Verkocht
-
Pagina's
58
Cijfer
A+
Geüpload op
13-11-2024
Geschreven in
2024/2025

WGU D315 - PRE-ASSESSMENT: NETWORK AND SECURITY - FOUNDATIONS .A ______ is a device that connects two or more packet-switched networks or subnetworks. It serves two primary functions: managing traffic between these networks by forwarding data packets to their intended IP addresses, and allowing multiple devices to use the same internet connection. - ANSWER-Router .A _______ attack send TCP/IP traffic to each and every port to learn which services are running. Spoofing Port scanning Ping flood SQL Injection - ANSWER-Port Scanning .A bridge _________________________________________________ a. connects wireless devices to the network using AES b. connects storage systems using IP based connections c. connects two networks by forwarding traffic without analysis for which host receives the data d. provides a direct connection to devices on the same network - ANSWER-c. connects two networks by forwarding traffic without analysis for which host receives the data .A company has the policy that all new user passwords are P@ssw0rd but does not require new users to change their password. An employee randomly tries a coworker's account with the new user password to see if they can log in as the coworker. Which type of vulnerability does this create? a. BYOD b. Weak password c. Default password d. Misconfigured firewall rules - ANSWER-Default password .A company is concerned with traffic that flows through the network. There is a concern that there may be malware that exists that is not being blocked or eradicated by antivirus. What technology can be put in place to detect potential malware traffic on the network? IDS firewall Honeypot NAC - ANSWER-IDS .A company needs to secure the network using a security system that can inspect the network traffic's payload to prevent attacks. What type of firewall would you recommend? Application Firewall Stateful Firewall Packet Filtering Layer 3 or 4 Firewall - ANSWER-Application Firewall .A company provides access to employees' tax and personal information via a public-facing web portal. What should the company implement to encrypt employees' web access to this information? a. Transport layer security (TLS) b. Network intrusion detection system (NIDS) c. Advanced encryption standard (AES) d. Two-factor authentication (2FA) - ANSWER-a. Transport layer security (TLS) .A cybersecurity specialist is asked to identify the potential criminals known to attack the organization. Which type of hackers would the cybersecurity specialist be least concerned with? Gray hat hackers Black hat hackers Script kiddies White hat hackers - ANSWER-White hat hackers .A hub is the device of choice to decrease traffic on a network segment. True False - ANSWER-False .A malicious user was able to lock a user's account after guessing the user's password multiple times unsuccessfully. Which category of the CIA triad did the malicious user target in this attack? a. Confidentiality b. Integrity c. Availability d. Accessibility - ANSWER-c. Availability .A malicious user was able to perform a password brute force attack on a human resource email account and is now reading through all their emails. Which category of the CIA triad was compromised? Authentication Confidentiality Availability Integrity - ANSWER-Confidentiality .A network admin is configuring an application and needs to be sure that port 4432 is open what tool should the admin use? Ping netstat nmap TCP_Function - ANSWER-nmap (Network Mapper) It is an open-source Linux command-line tool that is used to scan IP addresses and ports in a network and to detect installed applications. .A router is a Layer 3 device. True False - ANSWER-True .A stateful firewall uses Stateful Packet Inspection to protect the network. How does this type of firewall operate? a. A stateful firewall uses a list to allow connections b. A stateful firewall makes requests on behalf of other systems on a Network c. A stateful firewall that compares all inbound traffic to ensure there is an outbound request. d. A stateful firewall that compares IP addresses to a block list to deny connections - ANSWER-c. A stateful firewall that compares all inbound traffic to ensure there is an outbound request. .A switch forwards data only to the port that are connected to the destination device. It knows which port to forward it to based on which value?* Conf value IP address Port Number MAC Address - ANSWER-MAC Address .A switch is a Layer 1 device and unlike a hub it creates a direct connection to devices on the network. True False - ANSWER-False .A third world country has solicited the services of several hackers to perform an attack on the U.S. treasury department? Which time of attack would this be classified as? Nation State Espionage Industrial Espionage International Espionage World Espionage - ANSWER-Nation State Espionage .A user is mistakenly granted access to customer accounts not required for his duties. Which component of the AAA model is violated? a. Authentication b. Authorization c. Availability d. Access - ANSWER-b. Authorization

Meer zien Lees minder
Instelling
WGU D315 - PRE-ASSESSMENT
Vak
WGU D315 - PRE-ASSESSMENT











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
WGU D315 - PRE-ASSESSMENT
Vak
WGU D315 - PRE-ASSESSMENT

Documentinformatie

Geüpload op
13 november 2024
Aantal pagina's
58
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

WGU D315 - PRE-ASSESSMENT: NETWORK AND
SECURITY - FOUNDATIONS
.A ______ is a device that connects two or more packet-switched networks or subnetworks. It serves two
primary functions: managing traffic between these networks by forwarding data packets to their intended IP
addresses, and allowing multiple devices to use the same internet connection. - ANSWER-Router



.A _______ attack send TCP/IP traffic to each and every port to learn which services are running.



Spoofing

Port scanning

Ping flood

SQL Injection - ANSWER-Port Scanning



.A bridge _________________________________________________

a. connects wireless devices to the network using AES

b. connects storage systems using IP based connections

c. connects two networks by forwarding traffic without analysis for which host receives the data

d. provides a direct connection to devices on the same network - ANSWER-c. connects two networks by
forwarding traffic without analysis for which host receives the data



.A company has the policy that all new user passwords are P@ssw0rd but does not require new users to
change their password. An employee randomly tries a coworker's account with the new user password to see if
they can log in as the coworker. Which type of vulnerability does this create?



a. BYOD

b. Weak password

c. Default password

,d. Misconfigured firewall rules - ANSWER-Default password



.A company is concerned with traffic that flows through the network. There is a concern that there may be
malware that exists that is not being blocked or eradicated by antivirus. What technology can be put in place to
detect potential malware traffic on the network?



IDS

firewall

Honeypot

NAC - ANSWER-IDS



.A company needs to secure the network using a security system that can inspect the network traffic's payload
to prevent attacks. What type of firewall would you recommend?



Application Firewall

Stateful Firewall

Packet Filtering

Layer 3 or 4 Firewall - ANSWER-Application Firewall



.A company provides access to employees' tax and personal information via a public-facing web portal. What
should the company implement to encrypt employees' web access to this information?



a. Transport layer security (TLS)

b. Network intrusion detection system (NIDS)

c. Advanced encryption standard (AES)

d. Two-factor authentication (2FA) - ANSWER-a. Transport layer security (TLS)



.A cybersecurity specialist is asked to identify the potential criminals known to attack the organization. Which
type of hackers would the cybersecurity specialist be least concerned with?

,Gray hat hackers

Black hat hackers

Script kiddies

White hat hackers - ANSWER-White hat hackers



.A hub is the device of choice to decrease traffic on a network segment.



True

False - ANSWER-False



.A malicious user was able to lock a user's account after guessing the user's password multiple times
unsuccessfully.

Which category of the CIA triad did the malicious user target in this attack?



a. Confidentiality

b. Integrity

c. Availability

d. Accessibility - ANSWER-c. Availability



.A malicious user was able to perform a password brute force attack on a human resource email account and is
now reading through all their emails. Which category of the CIA triad was compromised?



Authentication

Confidentiality

Availability

Integrity - ANSWER-Confidentiality

, .A network admin is configuring an application and needs to be sure that port 4432 is open what tool should
the admin use?



Ping

netstat

nmap

TCP_Function - ANSWER-nmap (Network Mapper)



It is an open-source Linux command-line tool that is used to scan IP addresses and ports in a network and to
detect installed applications.



.A router is a Layer 3 device.



True

False - ANSWER-True



.A stateful firewall uses Stateful Packet Inspection to protect the network. How does this type of firewall
operate?



a. A stateful firewall uses a list to allow connections

b. A stateful firewall makes requests on behalf of other systems on a Network

c. A stateful firewall that compares all inbound traffic to ensure there is an outbound request.

d. A stateful firewall that compares IP addresses to a block list to deny connections - ANSWER-c. A stateful
firewall that compares all inbound traffic to ensure there is an outbound request.



.A switch forwards data only to the port that are connected to the destination device. It knows which port to
forward it to based on which value?*
$24.49
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
BESTPRICE

Maak kennis met de verkoper

Seller avatar
BESTPRICE EXAMS
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
0
Lid sinds
1 jaar
Aantal volgers
0
Documenten
36
Laatst verkocht
-
BESTPRICE

Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers. We specialize on NURSING,WGU,ACLS USMLE,TNCC,PMHNP,ATI and other major courses, Updated Exam, Study Guides and Test banks. If you don't find any document you are looking for in this store contact us and we will fetch it for you in minutes, we love impressing our clients with our quality work and we are very punctual on deadlines. Please go through the sets description appropriately before any purchase and leave a review after purchasing so as to make sure our customers are 100% satisfied. I WISH YOU SUCCESS IN YOUR EDUCATION JOURNEY

Lees meer Lees minder
0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen