100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D315 - PRE-ASSESSMENT: NETWORK AND SECURITY – FOUNDATIONS ACTUAL EXAM 250 QUESTIONS AND CORRECT ANSWERS 2025 LATEST UPDATE//GRADED A+

Rating
5.0
(6)
Sold
-
Pages
52
Grade
A+
Uploaded on
21-02-2025
Written in
2024/2025

WGU D315 - PRE-ASSESSMENT: NETWORK AND SECURITY – FOUNDATIONS ACTUAL EXAM 250 QUESTIONS AND CORRECT ANSWERS 2025 LATEST UPDATE//GRADED A+ WGU D315 - PRE-ASSESSMENT: NETWORK AND SECURITY – FOUNDATIONS ACTUAL EXAM 250 QUESTIONS AND CORRECT ANSWERS 2025 LATEST UPDATE//GRADED A+

Show more Read less
Institution
WGU D315 - PRE-ASSESSMENT: N
Module
WGU D315 - PRE-ASSESSMENT: N











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D315 - PRE-ASSESSMENT: N
Module
WGU D315 - PRE-ASSESSMENT: N

Document information

Uploaded on
February 21, 2025
Number of pages
52
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D315 - PRE-ASSESSMENT: NETWORK AND SECURITY –
FOUNDATIONS ACTUAL EXAM 250 QUESTIONS AND
CORRECT ANSWERS 2025 LATEST UPDATE//GRADED A+
Which OSI layer is related to the function of the IP protocol suite?

a. Transport

b. Network

c. Data Link

d. Session - answer-Network



Which OSI layer is responsible for organizing how bits are passed over the physical layer between
devices within the same collision domain?

a. Frame

b. Connection

c. Transport

d. Data Link - answer-Data Link



Which OSI layer would define the scope of a protocol that makes sure packets of data are received
correctly and resends them if they are not?

a. Validation

b. Transmission

c. Transport

d. Connection - answer-Transport



Which protocol suite performs functions of OSI layer 4?

a. IPX

b. MAC

c. CSMA/CD

d. TCP - answer-TCP

,Kyle is concerned that an attacker is probing his network and would like to use a decoy system to
attract the attacker and analyze his or her activity. What type of tool would best meet Kyle's needs?



Honeypot

Sinkhole

Jump box

Darknet - answer-Honeypot



A cybersecurity specialist is asked to identify the potential criminals known to attack the
organization. Which type of hackers would the cybersecurity specialist be least concerned with?

Gray hat hackers

Black hat hackers

Script kiddies

White hat hackers - answer-White hat hackers



Which attack floods a system with traffic in order to prevent legitimate activities or transactions from
occurring?

Brute force attack

Privilege escalation

Denial of service attack

Man-in-the-middle attack - answer-Denial of service attack



What type of attack targets an SQL database using the input field of a user?

Buffer overflow

SQL injection

XML injection

Cross-site scripting - answer-SQL Injection



Two or more computers connected together over a wide geographical area (e.g. county, country,
globe). What type of network is this?

LAN

,School Network

WAN

The Internet - answer-Wide Area Network (WAN)



In cybersecurity, what does CIA stand for? - answer-Confidentiality, Integrity, Availability



Which layer of the OSI model is responsible for the establishment, maintaining and terminating the
connection between two systems?

Session

Presentation

Data Link

Network - answer-Session



In the OSI model, what is the primary function of the Network layer?

Allows applications to establish, use, and end a connection

Routes data between networks

Transmits data frames

Ensures that packets are delivered with no loss or duplication - answer-Routes data between
networks



The restrictions most commonly implemented in packet-filtering firewalls are based on ____.

IP source and destination address

Direction (inbound or outbound)

TCP or UDP source and destination port requests

All of the above - answer-All of the above



Kim has taken her Network and Security Foundation exam and is waiting to get her results by email.
By accident, Kim's results are sent to Karen. What part of the CIA Triad is affected? - answer-
Confidentiality

, Barry is working with his organization's platforms team to select a virtualization approach for use in
their data center. To provide stronger security, he would like to select a hypervisor that runs directly
on bare metal hardware without an intervening host operating system. What type of hypervisor
should he choose?

Type 2

Type 1

Type 3

Type 4 - answer-Type 1



What encryption algorithm uses the same pre-shared key to encrypt and decrypt data? - answer-
Symmetric



In a hybrid cloud, data is traveling over the wide area network (WAN) connection between the
private and public clouds is known as?

Data at Rest

Data in Transit

Data in Use

Data in Motion - answer-Data in Transit



You have implemented a network where each device provides all other devices on the network with
access to shared files. What type of network do you have? - answer-Peer-to-Peer



Alice would like to send a message to Bob using an asymmetric cryptography algorithm. What key
should she use to encrypt the message? - answer-Bob's Public Key



Gary is participating in a cybersecurity exercise. His job is to defend the network against attack. What
role is Gary playing?

Red team

Blue team

Black team

White team - answer-Blue Team

Reviews from verified buyers

Showing all 6 reviews
4 months ago

4 months ago

4 months ago

4 months ago

4 months ago

10 months ago

5.0

6 reviews

5
6
4
0
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
JAYDEN254 Walden University
View profile
Follow You need to be logged in order to follow users or courses
Sold
157
Member since
1 year
Number of followers
14
Documents
1968
Last sold
1 day ago
GOLD-RATED TOP SELLER ON STUVIA – YOUR TRUSTED HUB FOR EXCEPTIONAL STUDY RESOURCES! ACHIEVE MORE WITH EXPERTLY CRAFTED MATERIALS THAT GUARANTEE RESULTS!

GOLD-RATED TOP SELLER ON STUVIA – YOUR TRUSTED HUB FOR EXCEPTIONAL STUDY RESOURCES! ACHIEVE MORE WITH EXPERTLY CRAFTED MATERIALS THAT GUARANTEE RESULTS! Welcome to Your Ultimate Study Hub on Stuvia! As a Gold-Rated Top Seller with a proven reputation for excellence, I offer carefully curated, verified study materials designed to help you achieve remarkable academic success. With countless students benefiting from my 5-star rated resources, I am committed to providing clear, accurate, and comprehensive content that will guide you to your academic goals. Whether you\'re aiming for top grades, preparing for critical exams, or simply seeking reliable study aids, my collection of expertly crafted notes, summaries, and guides has you covered. I understand the importance of high-quality, dependable materials in your academic journey. That’s why every document in my store is thoughtfully created to meet your specific needs, ensuring you have the tools to succeed with confidence. Browse my store and take the first step toward academic excellence. Join thousands of satisfied students who have leveraged my resources to excel in their studies. Shop now and unlock the secret to achieving A+ results! Did my resources help you succeed? I’d love to hear about your experience! Please leave a review of your experience with our study documents.

Read more Read less
5.0

4201 reviews

5
4186
4
5
3
7
2
0
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions