100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

2024 WGU D315 - PRE-ASSESSMENT NETWORK AND SECURITY – FOUNDATIONS EXAM WITH CORRECT ANSWERS

Rating
-
Sold
-
Pages
39
Grade
A+
Uploaded on
10-08-2024
Written in
2024/2025

2024 WGU D315 - PRE-ASSESSMENT NETWORK AND SECURITY – FOUNDATIONS EXAM WITH CORRECT ANSWERS

Institution
WGU D315 - PRE-ASSESSMENT NETWORK AND SECURITY
Course
WGU D315 - PRE-ASSESSMENT NETWORK AND SECURITY











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D315 - PRE-ASSESSMENT NETWORK AND SECURITY
Course
WGU D315 - PRE-ASSESSMENT NETWORK AND SECURITY

Document information

Uploaded on
August 10, 2024
Number of pages
39
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

2024 WGU D315 - PRE-
ASSESSMENT NETWORK AND
SECURITY – FOUNDATIONS EXAM
WITH CORRECT ANSWERS

Which OSI layer would define the scope of a protocol that makes sure
packets of data are received correctly and resends them if they are not?

a. Validation
b. Transmission
c. Transport
d. Connection - CORRECT ANSWERS-Transport


Which type of attack send emails claiming to be your bank and asking you to
verify that your username and password are correct?

Dictionary attack
Phishing
Brute force attack
Man-in-the-middle - CORRECT ANSWERS-Phishing


Which protocol suite performs functions of OSI layer 4?

a. IPX
b. MAC
c. CSMA/CD
d. TCP - CORRECT ANSWERS-TCP


What are two types of encryption?

a. Symmetric encryption, the same key encrypts and decrypts data;
asymmetric encryption different keys encrypt and decrypt data
b. Synchronous encryption, the same key encrypts and decrypts data;
asynchronous encryption different keys encrypt and decrypt data
c. Symmetric encryption, a different key encrypts and decrypts data;
asymmetric encryption, the same key encrypts and decrypts data

,d. Synchronous encryption, a different key encrypts and decrypts data;
asynchronous encryption the same key encrypts and decrypts data -
CORRECT ANSWERS-a. Symmetric encryption, the same key encrypts and
decrypts data; asymmetric encryption different keys encrypt and decrypt
data


Which OSI layer is related to the function of the IP protocol suite?

a. Transport
b. Network
c. Data Link
d. Session - CORRECT ANSWERS-Network

Which OSI layer is responsible for organizing how bits are passed over the
physical layer between devices within the same collision domain?

a. Frame
b. Connection
c. Transport
d. Data Link - CORRECT ANSWERS-Data Link

Who uses Nessus software to san servers and network devices for known
vulnerabilities.

Script Kiddies
Insider threats
Vulnerability testers
Black hat hackers - CORRECT ANSWERS-Vulnerability testers

Which attack allows an attacker to take control of a database by inserting
special commands into input boxes instead the intended data? - CORRECT
ANSWERS-SQL Injection

What type of attack is it when the attacker discovers a software vulnerability
that does not have a patch? - CORRECT ANSWERS-Zero-day

What phrase represents Authentication best?

Do you do what you say you will do?
Are you credentialed for the level of access you need?
Did you arrive at the time you said you did?
Are you who you say you are? - CORRECT ANSWERS-Are you who you say
you are?

ARP Poisoning allows an attacker to:

,Eavesdrop on the traffic sent through the Hub
Eavesdrop on the traffic sent through the Switch
Eavesdrop on the traffic sent through the Router
Eavesdrop on the traffic sent through the Firewall - CORRECT ANSWERS-
Eavesdrop on the traffic sent through the Switch

What does AAA stand for?

Authorization, Access and Accounting
Authentication, Access and Autoscaling
Authentication, Authorization and Accounting
Access, Authorization and Authentication - CORRECT ANSWERS-
Authentication, Authorization and Accounting

What is the best choice that describes the difference between IDS and IPS?

a. IPS can only detect intrusions and IDS can detect and stop malicious
network attacks.
b. IDS can detect intrusions and IDS can stop malicious network attacks.
c. IDS is only used for webservers; IPS can be used in all environments
d. IDS can detect intrusions; IPS can stop malicious network attacks. -
CORRECT ANSWERS-d. IDS can detect intrusions; IPS can stop malicious
network attacks.

Which type of Ethernet cable can maintain 10Gbps transmission speeds
through the course of its maximum 100-meter length?

a. CAT 5e
b. CAT 5
c. CAT 3
d. CAT 6a - CORRECT ANSWERS-CAT 6a

Which Internet access technology uses ordinary telephone wires for data
transmission?

a. DSL
b. Cable
c. Wi-Fi
d. Hotspot - CORRECT ANSWERS-DSL

Which device is used to organize network cables as they run between
switches and other network devices?

a. Jack
b. Hub

, c. Patch Panel
d. Router - CORRECT ANSWERS-Patch Panel

Which network device is used to connect two or more network segments by
performing OSI layer 3 functions like packet-forwarding?

a. Router
b. Repeater
c. Wire
d. Switch - CORRECT ANSWERS-Router

Which network device is used to convert between digital information from a
LAN and analog signals for transmission over a standard telephone wire?

a. Repeater
b. Modem
c. Signal Generator
d. Bit Stretcher - CORRECT ANSWERS-Modem

Which device could be used to send commands to the mainframe for remote
execution in early mainframe installations?

a. Distributed Screens
b. Dumb Terminals
c. Execution Displays
d. Command Receivers - CORRECT ANSWERS-Dumb Terminals

Which device is responsible for implementing network address translation
(NAT)?

a. Modem
b. Router
c. NIC
d. Switch - CORRECT ANSWERS-Router

Which command produces the following output?
Non-authoritative answer:
Name: www.google.com
Address: 172.217.11.132

a. dig
b. nslookup
d. whois
d. nmap - CORRECT ANSWERS-nslookup
$20.19
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
EXAMLINE

Get to know the seller

Seller avatar
EXAMLINE EXAMS
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
1 year
Number of followers
0
Documents
15
Last sold
-
EXAMLINE,

DON'T BE A CHALLENGE TO BE CHALLENGED BY THE CHALLENGER BE THE CHALLENGER TO CHALLENGE THE CHALLENGE !!!LET'S CHALLENGE THE EXAM We have just re-established our shop, my aim is to elevate and guide students academically with actual guides and exams 100% verified.Incase you dont find the exam that you are looking for,feel free to inbox me and request any exam.My prices are never fixed,always negotiable , WELCOME ,LETS BEGIN.

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions