WGU D315 | OA| OBJECTIVE ASSESSMENT | EXAM
QUESTIONS AND ANSWERS
Correct 43
Incorrect 00
What layer is HTTP associated with?
Application (7th Transport (4th)
Presentation (6th) Network (3rd)
, 2 of 43
Definition
Which encryption application provides authentication and
encryption services that are commonly used to create VPN tunnels
at OSI Layer 3?
Give this one a try later!
Internet protocol security Internet control message protocol
(IPSec) (icmp)
Transmission control protocol (TCP) Transport layer security (tls)
Don't know?
3 of 43
Definition
What is the main type of attack that occurs on the Data Link layer?
*Hint* SomeBody Must Really Prefer Playing Songs Downloaded VS
Watching
Give this one a try later!
Denial of service/Deauth +
Session Hijacking + DNS Spoofing
VLAN Hopping
, IP Spoofing + ARP Poisoning Buffer Overflow + SYN Flood
Don't know?
4 of 43
Definition
A network admin is configuring an application and needs to be sure
that port 4432 is open what tool should the admin use?
Give this one a try later!
nessus dig
ping nmap
Don't know?
5 of 43
Definition
Encryption is the process of concealing data, and despite its name,
is commonly performed at the ____ layer using Transport Layer
Security (TLS), the replacement for the now deprecated SSL
protocol commonly used to secure web pages.
Give this one a try later!
QUESTIONS AND ANSWERS
Correct 43
Incorrect 00
What layer is HTTP associated with?
Application (7th Transport (4th)
Presentation (6th) Network (3rd)
, 2 of 43
Definition
Which encryption application provides authentication and
encryption services that are commonly used to create VPN tunnels
at OSI Layer 3?
Give this one a try later!
Internet protocol security Internet control message protocol
(IPSec) (icmp)
Transmission control protocol (TCP) Transport layer security (tls)
Don't know?
3 of 43
Definition
What is the main type of attack that occurs on the Data Link layer?
*Hint* SomeBody Must Really Prefer Playing Songs Downloaded VS
Watching
Give this one a try later!
Denial of service/Deauth +
Session Hijacking + DNS Spoofing
VLAN Hopping
, IP Spoofing + ARP Poisoning Buffer Overflow + SYN Flood
Don't know?
4 of 43
Definition
A network admin is configuring an application and needs to be sure
that port 4432 is open what tool should the admin use?
Give this one a try later!
nessus dig
ping nmap
Don't know?
5 of 43
Definition
Encryption is the process of concealing data, and despite its name,
is commonly performed at the ____ layer using Transport Layer
Security (TLS), the replacement for the now deprecated SSL
protocol commonly used to secure web pages.
Give this one a try later!