100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Network and Security- Foundations- D315 questions with verified answers

Rating
-
Sold
-
Pages
33
Grade
A+
Uploaded on
25-02-2025
Written in
2024/2025

3 DES Ans-Triple DES (often abbreviated 3DES) is a symmetric encryption algorithm that uses the now antiquated DES (data encryption standard) algorithm three times in a row to encrypt your data. The DES algorithm uses only 56-bit encryption and can be compromised by brute force software running on modern hardware in less than a day. Accounting Ans-Thus, you have a need for the critical nature of accounting to verify that the restrictions you thought were in place are working as expected and that there is not attempted or actual unauthorized access. Accounting also includes verifying the correct access control settings on data files, providing a forensic trail after a security breach to determine how the attacker got in (to harden defenses for the future) and what they accessed (for damage control and potential changes to permissions in the future) Ad-hoc Ans-In ad-hoc mode, all wireless communication is performed in a peer-to-peer fashion and does not require or involve a WAP. Ad-hoc wireless networks are rarely used in homes or offices, but they can be helpful in setting up a new device, such as a printer by connecting them directly, much as one would do with a physical cable. Ad-hoc networks are also occasionally used to transfer files between devices, such as between a camera and a laptop. Advanced Encryption Standard (AES)

Show more Read less











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
February 25, 2025
Number of pages
33
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Network and Security- Foundations- D315 questions
with verified answers
3 DES Ans✓✓✓-Triple DES (often abbreviated 3DES) is a symmetric encryption
algorithm that uses the now antiquated DES (data encryption standard) algorithm
three times in a row to encrypt your data. The DES algorithm uses only 56-bit
encryption and can be compromised by brute force software running on modern
hardware in less than a day.


Accounting Ans✓✓✓-Thus, you have a need for the critical nature of accounting
to verify that the restrictions you thought were in place are working as expected
and that there is not attempted or actual unauthorized access. Accounting also
includes verifying the correct access control settings on data files, providing a
forensic trail after a security breach to determine how the attacker got in (to
harden defenses for the future) and what they accessed (for damage control and
potential changes to permissions in the future)


Ad-hoc Ans✓✓✓-In ad-hoc mode, all wireless communication is performed in a
peer-to-peer fashion and does not require or involve a WAP. Ad-hoc wireless
networks are rarely used in homes or offices, but they can be helpful in setting up
a new device, such as a printer by connecting them directly, much as one would
do with a physical cable. Ad-hoc networks are also occasionally used to transfer
files between devices, such as between a camera and a laptop.


Advanced Encryption Standard (AES) Ans✓✓✓-Currently, the most secure
algorithm for storing and encrypting data at rest is the Advanced Encryption
Standard (AES), a symmetric key cipher that makes use of different key and block
sizes and creates a near-impenetrable encryption.

,Advanced Persistent Threat (APT) Ans✓✓✓-A network attack in which an
intruder gains access to a network and stays there undetected with the intention
of stealing data over a long period of time.


AES Ans✓✓✓-The Advanced Encryption Standard (AES) is considered a very
secure form of encryption today, although, with advances in computing power
and quantum computing, it may not be considered secure forever. AES can be
used with a 128-bit, 192-bit, or 256-bit key. Longer key lengths are exponentially
harder to crack, but they also increase the amount of computing power required
to encrypt the data. Today, most devices and websites use the 256-bit version
(AES-256).


Application Layer (Layer 7) Ans✓✓✓-This layer is responsible for network
applications (like HTTP or FTP) and their production of data to be transferred over
the network.


Application Layer Ans✓✓✓-This layer is responsible for the communication
protocols between nodes. The protocols in this layer include hypertext transfer
protocol (HTTP and HTTPS), Secure Shell (SSH), and network time protocol (NTP),
among many others.


Application Level Ans✓✓✓-To combat this potential weakness in security,
network administrators began using proxy servers that could act as a middleman,
reading and parsing the traffic payload and then forwarding it on to the intended
destination if the payload was safe


ARP Ans✓✓✓-Address Resolution Protocol

,Displays the MAC address mapping for the hosts that have been discovered in the
ARP cache


ARP poisoning Ans✓✓✓-Which is a method attackers use to cause an Ethernet
switch to flood all traffic to every port on the switch, including the attacker
computer


Asymmetric Key Encryption Ans✓✓✓-Asymmetric key ciphers rely on two
different keys to encrypt and decrypt the traffic. This is particularly useful on the
internet where the encryption of the data being sent to and from e-commerce
and banking websites is needed. The customers have no reliable and secure
means to exchange a secret key prior to the data transfer, so public key
infrastructure (PKI) is relied upon.


Authentication Ans✓✓✓-When you think of authentication, you may think of a
person gaining access to resources, but authentication is actually just the process
of confirming a person's identity. A system can confirm your identity via
usernames and passwords or with certificates, as is the case with public key
infrastructure (PKI).


Authorization Ans✓✓✓-Once the identity of the user has been confirmed
through authentication, the authorization system steps in to determine what the
user may access. For example, can the user access resources in a particular
subnet? Does the user have access to a particular server or file? If data access is in
question, can the user write to or delete the data, or is the access read-only? The
list of questions (and potential restrictions) goes on almost endlessly.


Availability Ans✓✓✓-The goal of the availability principle is to ensure the data is
always accessible by it's authorized user.

, Black-hat hackers Ans✓✓✓-May or may not be IT professionals but possess the
knowledge and will to breach system for profit


Blue Team Ans✓✓✓-The blue team defends


Bridge {Data link Layer} Ans✓✓✓-Connects two or more networks


Forwards data to next network with analysis


Not widely used in modern networks


Buffer overflow Ans✓✓✓-In this case, the attacker purposefully entered text that
was too large to fit within a region of memory called a "Buffer"


Bus Topology Ans✓✓✓-All the devices are connected to a shared single cable


Bus topologies are uncommon today


Computers in a bus topology physically tap into the network cable using special
adapters


The ends of the cables have terminators


In a bus topology only one computer can communicate at a time

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
cracker Chamberlain School Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
2022
Member since
3 year
Number of followers
1344
Documents
47129
Last sold
2 days ago
✨ Cracker – Verified Study Powerhouse

Welcome to your shortcut to academic and certification success. I'm Cracker, a trusted top seller I specialize in high-quality study guides, test banks, certification prep, and real-world exam material all tailored to help you pass fast and score high.

3.8

369 reviews

5
162
4
84
3
52
2
22
1
49

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions