WGU D315 |PA|PRE-ASSESSMENT| EXAM QUESTIONS
AND ANSWERS
Correct
Incorrect
.
where should the media be stored?
, In a secure location somewhere in In a secure location in the server
the building room
Don't know?
2 of 36
Term
A security analyst identifies malware that is traced back to the IP
address 93.184.216.34. Which one of the following tools might the
security analyst use to determine if an active connection to that IP
address still resides on the infected system?
Give this one a try later!
netstat tracert
ping nslookup
Don't know?
3 of 36
Term
A single cable break can cause complete network disruption and it
uses a single backbone to connect all network devices.
Give this one a try later!
, BUS Topology Star Topology
Ring Topology Mesh Topology
Don't know?
4 of 36
Term
Which of the following is considered a transport protocol?
Give this one a try later!
IP HTTP
FTP TCP
Don't know?
5 of 36
Term
Which of the following is an example of two-factor authentication?
Give this one a try later!
AND ANSWERS
Correct
Incorrect
.
where should the media be stored?
, In a secure location somewhere in In a secure location in the server
the building room
Don't know?
2 of 36
Term
A security analyst identifies malware that is traced back to the IP
address 93.184.216.34. Which one of the following tools might the
security analyst use to determine if an active connection to that IP
address still resides on the infected system?
Give this one a try later!
netstat tracert
ping nslookup
Don't know?
3 of 36
Term
A single cable break can cause complete network disruption and it
uses a single backbone to connect all network devices.
Give this one a try later!
, BUS Topology Star Topology
Ring Topology Mesh Topology
Don't know?
4 of 36
Term
Which of the following is considered a transport protocol?
Give this one a try later!
IP HTTP
FTP TCP
Don't know?
5 of 36
Term
Which of the following is an example of two-factor authentication?
Give this one a try later!