100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D482 Performance Assessment (Secure Network Design) – Questions & Accurate Answers

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
12-06-2025
Written in
2024/2025

WGU D482 Performance Assessment (Secure Network Design) – Questions & Accurate Answers

Institution
WGU D482
Course
WGU D482










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D482
Course
WGU D482

Document information

Uploaded on
June 12, 2025
Number of pages
19
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D482 Performance Assessment (Secure
Network Design) – Questions & Accurate Answers
A laptop has been stolen, and the data has been seen for sale on the
darknet. Which process could have protected the confidentiality of
the data? Correct Answer - Hard Drive Encryption

Classify each attack method in relation to its direct impact on the
CIA triad. Correct Answer - Key Logger: Confidentiality
DNS Poisoning: Integrity
Covert Channels: Confidentiality
DDoS: Availability

A security administrator has configured a small keysize to protect
the VPN.
Which security objective does this affect? Correct Answer -
Confidentiality

A laptop has been stolen, and the data has been seen for sale on the
darknet.
Which process could have protected the confidentiality of the data?
Correct Answer - Hard Drive encryption

When browsing to a financial website, a user receives an error on
the browser that points to the certificate
on the website. The user reviews the certificate and maps it to a
known certificate authority.
Why did the user need to perform these actions? Correct Answer -
To establish a trust relationship

A team of scientists is working on a secure project. The network
administrator needs to configure a

,network for the team that is not routable from the Internet. A
firewall is protecting the scientists' network
and is using network address translation (NAT) to translate the
internal IP addresses to public IP
addresses.
Which IP address should the network administrator configure on
the inside interface of the firewall? Correct Answer -
10.14.15.16

An ad hoc network design team has just finished a presentation on
the latest updates to the organization's
network infrastructure. The team ensured that plenty of redundancy
has been built in and bottlenecks
have been eliminated.
Which security objective has the team bolstered through these
improvements? Correct Answer - Availability

A company has recently implemented a new email encryption
system that uses public key infrastructure
(PKI). The company is now requiring all employees to sign and
encrypt internal communication. An
employee wants to send a digitally signed message to the IT
director.
What does the IT director use to decode the employee's signature
under the new system? Correct Answer - The employee's
public key

An administrator at a small office is tasked with supporting a new
time clock that has been installed on the
network. The outsourced company managing the time clock states
that the connection protocol it uses
with the clock is encrypted, but it needs to allow incoming
connections from the Internet.

, Which action should allow the outsourced company to securely
manage the time clock with a minimal
amount of configuration effort? Correct Answer - Setting up a
port forward on the firewall from the outsourced company to the
time clock

A small nonprofit company has received several legacy wireless
access points (APs) as a donation. The
security administrator discovers that the encryption protocol the
devices use is not very secure. The encryption key can be discovered
by a malicious hacker in only a few minutes. After discussions with
other
security professionals, the administrator learns the APs can
implement a key protocol that can change the
encryption key every few seconds and provide a per-packet
verification at each side of the
communication.
Which security measure is the key protocol implemented to protect?
Correct Answer - Integrity of the key

A recently terminated employee from accounting used several
widely available programs in an amateur
attempt to exploit a company's database.
Which term describes the terminated employee? Correct Answer
- Script kiddies

An organization has recently undergone a period of growth, both in
terms of business operations and
personnel. The network infrastructure has kept pace, growing to
accommodate the new size and
structure. Mapping and auditing of the expanded network needs to
be done. One of the first findings is
that the router has permissive rights to all unassigned ports.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StudyHall Chamberlain School Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
1293
Member since
2 year
Number of followers
825
Documents
16371
Last sold
1 week ago
The Study Hall Shop ~ "Where learning meets success"

Dear Stuvia Community, As a passionate and dedicated learner, I believe that knowledge is most powerful when shared. With this mindset, I’m thrilled to introduce my Stuvia account, where I aim to provide valuable, high-quality study resources that empower students like you to excel in your academic journey. Whether you’re looking for detailed notes, comprehensive study guides, or insightful exam preparation materials, I am committed to making your study experience more efficient and effective. My goal is to simplify complex topics, break them down into digestible content, and offer fresh perspectives that will help you gain deeper understanding and achieve academic success. I firmly believe that learning should be engaging, accessible, and rewarding. That’s why I’ve worked hard to craft resources that are not only informative but also easy to follow and enjoyable. As a fellow student, I understand the challenges that come with studying, and I’m here to make that process a little bit easier for you. Let’s make learning a journey, not a chore. Explore my collection of notes, exams and study materials, and feel free to reach out if you need anything more. Together, we can achieve greatness! Thank you for considering my contributions to your academic success. Best Wishes! :)

Read more Read less
3.8

215 reviews

5
99
4
40
3
37
2
9
1
30

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions