Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D512 TASK 3 CERTIFICATION SCRIPT 2026 QUESTIONS WITH SOLUTIONS GRADED A+

Rating
-
Sold
-
Pages
20
Grade
A+
Uploaded on
30-03-2026
Written in
2025/2026

WGU D512 TASK 3 CERTIFICATION SCRIPT 2026 QUESTIONS WITH SOLUTIONS GRADED A+

Institution
WGU D512
Course
WGU D512

Content preview

WGU D512 TASK 3 CERTIFICATION SCRIPT
2026 QUESTIONS WITH SOLUTIONS
GRADED A+

◍ Magnum.
Answer: OpenStack module that is an umbrella project that provides
containerization assistance. This module is still in development.
◍ OpenFlow.
Answer: Defined by the ONF, is a protocol between the control and
forwarding layers of an SDN architecture, and is by far the most widespread
implementation of SDN.
◍ Routing Control Platform (RCP).
Answer: Proposed in for the provisioning of inter-domain routing over a
BGP network. Routing is done as a separate entity. Control from physically
distributed entities in a domain is logically centralized in a control plane.
◍ Installation.
Answer: The attacker may install malware on the victim.
◍ Proactive security.
Answer: Refers to a new paradigm of security management, where instead
of defending the network infrastructure by detecting, preventing, tracking
and remediation of threats, attack surface is changed over time.
◍ Network Functions Virtualization Infrastructure (NFVI).
Answer: Is the entirety of the hardware and software components that build
the environment where VNFs are deployed.
◍ Murano.
Answer: OpenStack module that provides a white list repository of

, applications.
◍ Risk.
Answer: The quantifiable likelihood of loss due to a realized threat, and it
emphasizes the quantitative of potential damages.
◍ Application Level MTD.
Answer: Involves a change in the application required, source code, memory
mapping, and software version.
◍ MTD - Redundancy.
Answer: Creates multiple replicas of a network component in order to
maintain an optimal level of service in case of network attacks like DDoS
attacks. Another benefit is that we can create decoys in the network for
increasing the discovery time of the actual target.
◍ Open Platform for NFV (OPNFV).
Answer: Created by the Linux Foundation in 2014 and is a collaborative
open-source platform that seeks to develop NFV and shape its evolution.
◍ NFV Management and Orchestration (NFV-MANO).
Answer: Consists of all functional blocks, data repositories, reference points,
and interfaces that are used for managing and orchestrating VNFs and the
NFVI.
◍ Clustering.
Answer: Adds a layer of defense against the controller being a single point
of failure by having one or more controllers in an active / standby scenario.
◍ RouteFlow.
Answer: Project initially named as QuagFlow, which aimed to provide IP
routing as Router-as-a-Service in a virtualized environment. Considered the
basic architecture to control routing in SDNs.
◍ OpenStack.
Answer: An open-source cloud computing platform that has high market
penetration that includes a collection of interoperable modules that are used

, to orchestrate large pools of compute, storage, and networking resources.
◍ Two most common forms of NVs.
Answer: Protocol-based virtual networksVirtual networks that are based on
virtual devices
◍ Ironic.
Answer: OpenStack module that is a provisioning tool for baremetal
installation of compute capabilities instead of VMs in OpenStack.
◍ Application layer.
Answer: Contains the typical network applications or functions
organizations use and talk to control layer via NBI
◍ L2TP (Layer 2 Tunneling Protocol).
Answer: a tunneling protocol used to support VPNs or as part of the delivery
of services by ISPs. It does not provide any encryption or confidentiality by
itself. Rather, it relies on an encryption protocol that it passes within the
tunnel to provide privacy.
◍ Vulnerability.
Answer: A weakness or gap in a security system that can be either exploited
by attackers or caused by malfunctioning system components.
◍ POSTROUTING.
Answer: After all other routing rules have been applied, the NAT chain that
will determine where it goes based on where it came from (source).
◍ Exploitation.
Answer: This implies actual detonation of the attack, such as the exploit
running on the system.
◍ Intrusion Prevention System (IPS).
Answer: a network security / threat prevention technology that examines
network traffic flows to detect and prevent vulner ability exploits.
◍ UDP port number 68.
Answer: Destination port of a DHCP client

Written for

Institution
WGU D512
Course
WGU D512

Document information

Uploaded on
March 30, 2026
Number of pages
20
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$13.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
ProfessorBeatrice

Get to know the seller

Seller avatar
ProfessorBeatrice Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
2 weeks
Number of followers
0
Documents
2170
Last sold
21 hours ago
Professor_Beatrice7

I believe learning isn’t just about cramming it’s about clarity, growth, and building the confidence to conquer any challenge. That’s why you’ll find a handpicked collection of top notch, easy to digest study materials, smart summaries, and guides tailored to a wide range of subjects and learning styles. Whether you're gearing up for exams, brushing up on class notes, or just need that extra push, I have you covered. From quick-reference sheets to deep-dive notes, there’s something here for every learner. Think of this place as a place where productivity meets peace of mind. So settle in and let’s sharpen your focus and fuel your success, one file at a time. Thanks for making me your study partner. Let’s unlock your full potential together!

Read more Read less
0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions