100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D482 (SECURE NETWORK DESIGN - D482) EXAM QUESTIONS AND ANSWERS |A+ GRADE

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
18-07-2024
Written in
2023/2024

WGU D482 (SECURE NETWORK DESIGN - D482) EXAM QUESTIONS AND ANSWERS |A+ GRADE

Institution
WGU D482
Course
WGU D482










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D482
Course
WGU D482

Document information

Uploaded on
July 18, 2024
Number of pages
19
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ASCORERS STUVIA
WGU D482 (SECURE NETWORK DESIGN - D482) EXAM
QUESTIONS AND ANSWERS |A+ GRADE
A company decides to implement Network Address Translation (NAT) and strict inbound access control after experiencing multiple breaches from external hosts connecting to its publicly available IP addresses. The system administrator verifies the Access Control List (ACL) is configured properly, but firewall log analysis still shows multiple external malicious hosts connected to internal company hosts. What should the security administrator
do to reduce the risk of further malicious connections? ANS: Implement an outbound ACL.
A company has been the target of multiple social engineering attacks and is implementing a new mandatory security awareness training program to reduce the risk of a future compromise. The security administrator is mainly concerned with the following attack vectors: Spoofed emails containing fake
password reset links aimed at harvesting employees' passwords Phone calls to the helpdesk by a malicious user pretending to be an employee needing a password reset A malicious user tailgating while impersonating a contractor to steal employees' mobile devices What are the two vulnerabilities that the company needs to address to meet the above requirements? ANS: Untrained users and Lack of Secure access control
A company has recently implemented a new email encryption system that uses public key infrastructure (PKI). The company is now requiring all employees to sign and encrypt internal communication. An employee wants to send a digitally signed message to the IT director. What does the IT director use to decode the employee's signature under the new system? ANS: The employee's public key
A company is concerned about employee usernames and passwords being obtained through phishing campaigns. Which emerging technology should the company employ to keep this from happening? ANS: Tokens ASCORERS STUVIA
A company is in the process of separating valid network traffic from malicious traffic. Currently, the company does not want to block valid traffic
that would cause an outage to an application. Which device will monitor and
classify potential malicious traffic to improve current policies? ANS: Intrusion Detection System (IDS)
A company needs an alternative to a VPN solution to provide secure communications between clients and servers within the extended organization. In addition to secure communications, eavesdropping and tampering with data while in transport must be prevented. Finally, endpoint authentication and confidentiality of communications must be provided. Which solution should be implemented based on these requirements? ANS: Secure Sockets Layer/Transport Layer Security (SSL/TLS)
A company's chief executive officer (CEO) is traveling overseas for a business meeting and wants to protect emails and video conference calls from a breach in confidentiality. Which strategy should be used to achieve this objective? ANS: Secure a VPN back into the corporate offices.
A company's chief information officer (CIO) has tasked the network security
team with a set of requirements for the next iteration of network security. The CIO wants a solution that will implement the following items:
Access control
Connectionless data integrity checking
Data origin authentication
Replay detection and rejection
Confidentiality using encryption
Traffic flow confidentiality
What provides this set of services? ANS: Internet Protocol Security (IPSec) ASCORERS STUVIA
A device on a network is pinging over 100 endpoints on the infrastructure. The IP and MAC addresses belong to the network management system. However, the MAC address has been spoofed. The machine is tracked down,
and it is an unknown rogue device that somehow got past the network admission control (NAC) device. Which action should be taken from this point forward? ANS: Contain and unplug this device from the network.
A firewall administrator is setting up the necessary rule to allow an email server to send and receive email. Which three elements does the Access Control List (ACL) need?
Choose 3 answers ANS: Source IP, Destination port, Base protocol
A firewall has been placed between two networks. Each network implements
a VPN concentrator to enable secure communication via a VPN in tunnel mode. What information regarding the VPN will the firewall logs provide? ANS: Information about the temporary encapsulation header
A firewall policy has an Access Control List (ACL), which allows a connection from a university that is not part of the company. Which description depicts what the company is currently doing that directly relates to this ACL? ANS: Running a web server on port 80
A laptop has been stolen, and the data has been seen for sale on the darknet. Which process could have protected the confidentiality of the data? ANS: Hard Drive encryption
A laptop has been stolen, and the data has been seen for sale on the darknet. Which process could have protected the confidentiality of the data? ANS: Hard Drive Encryption

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ascorers Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
909
Member since
1 year
Number of followers
59
Documents
3655
Last sold
7 hours ago
ASCORERSHUB

Welcome to your one-stop destination for high-quality academic resources! Here you’ll find test banks, solution manuals, ATI study guides, iHuman case studies, nursing exam prep materials, and verified textbook answers — all carefully selected to help you study smarter and score higher. Whether you’re preparing for nursing exams, business courses, medical case studies, or general college tests, this store offers reliable, up-to-date materials used by top students worldwide. Popular categories include: ✅ Test Banks & Solution Manuals ✅ ATI & HESI Study Guides ✅ iHuman Case Studies & Answers ✅ NCLEX & Nursing Exam Prep ✅ Business, Accounting & Economics Test Banks ✅ Psychology, Biology & Anatomy Materials Boost your academic performance with expertly curated resources that match real exams and class content.

Read more Read less
4.8

1078 reviews

5
963
4
47
3
45
2
9
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions