100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D315 PRE-ASSESSMENT LATEST 2024/2025 ACTUAL EXAM| NETWORK AND SECURITY FOUNDATIONS- D315 EXAM REVIEW WITH COMPLETE QUESTIONS AND CORRECT VERIFIED ANSWERS/ ALREADY GRADED A+ (BRAND NEW!!)

Rating
-
Sold
-
Pages
53
Grade
A+
Uploaded on
31-08-2024
Written in
2024/2025

WGU D315 PRE-ASSESSMENT LATEST 2024/2025 ACTUAL EXAM| NETWORK AND SECURITY FOUNDATIONS- D315 EXAM REVIEW WITH COMPLETE QUESTIONS AND CORRECT VERIFIED ANSWERS/ ALREADY GRADED A+ (BRAND NEW!!)

Institution
WGU D315
Course
WGU D315











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D315
Course
WGU D315

Document information

Uploaded on
August 31, 2024
Number of pages
53
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • wgu d315

Content preview

WGU D315 - PRE-ASSESSMENT: NETWORK AND SECURITY
– FOUNDATIONS/ Updated Questions with Correct
Answers -Latest 2024.

Which type of attack exploits an unpatched software vulnerability?

a. Zero-day

b. Brue-force

c. Diffie-Hellman

d. Man-in-the-middle - Correct Answer - Zero-day



A company has the policy that all new user passwords are P@ssw0rd but does not require new users to
change their password. An employee randomly tries a coworker's account with the new user password
to see if they can log in as the coworker. Which type of vulnerability does this create?

a. BYOD

b. Weak password

c. Default password

d. Misconfigured firewall rules - Correct Answer - Default password



An employee that does not want to miss emails from important clients sets up her cellular smartphone
to allow her to check email. Unfortunately, she does not install antivirus software on the cellular phone.
What type of vulnerability is represented?

a. Industry threat

b. Misconfigured firewall rules

c. Weak passwords

d. BYOD/Mobile - Correct Answer - BYOD/Mobile



What is the definition of vulnerability, in computer security?

a. It is a weakness which can be exploited by a threat, such as an attacker, to perform unauthorized
actions within a computer system.



pg. 1

,b. It is a possible danger that might exploit a weakness to breach security and therefore cause
possible harm.

c. It is an action taken by a threat that exploits a weakness that attempts to either block authorized
access to an asset or to gain unauthorized access to an asset.

d. It is the potential of a threat to exploit a weakness via an attack. - Correct Answer - It is a
weakness which can be exploited by a threat, such as an attacker, to perform unauthorized actions
within a computer system.



What is required to establish a secure connection to a remote network over an insecure link?

a. Virtual Private Network (VPN) service

b. Linux

c. Command Line Interface

d. TOR Network - Correct Answer - Virtual Private Network (VPN) service



An organization is concerned about brute force attacks.

How should the organization counter this risk?

a. Install a mantrap and biometric scanner at the entrance of its data center.

b. Implement a system hardening policy that ensures operating system updates and software
patches are installed regularly.

c. Institute a log-in policy that locks users out of an account after three failed password attempts.

d. Initiate role-based access to its systems to reduce the possibility of escalated privileges. - Correct
Answer - c. Institute a log-in policy that locks users out of an account after three failed password
attempts.



An organization suffers a social engineering attack that results in a cybercriminal gaining access to its
networks and to its customers' private information.

How can the organization mitigate this risk in the future?

a. Update user antivirus software to the latest version

b. Implement a stronger password policy

c. Provide regular cybersecurity training for employees

d. Install a sophisticated intrusion detection system - Correct Answer - c. Provide regular
cybersecurity training for employees


pg. 2

,An attacker plans to exploit flaws in an operating system to gain access to a user's computer system.
What is a prevention mechanism for this type of attack?

a. Firewall

b. Patching

c. Antivirus

d. Virtual Private Network (VPN) - Correct Answer - b. Patching



An unauthorized third-party has gained access to a company network.

How can they be prevented from deleting data?

a. Access controls

b. Physical controls

c. Biometrics

d. Man trap - Correct Answer - a. Access controls



An attacker has gained access to the passwords of several employees of a company through a brute force
attack. Which authentication method would keep the attacker from accessing the employees' devices?

a. MFA (multi-factor authentication)

b. AAA (authentication, authorization, and accounting)

c. PKI (public key infrastructure)

d. TCP/IP (transmission control protocol/internet protocol - Correct Answer - a. MFA (multi-factor
authentication)



After downloading a CD/DVD burning program, a user notices that someone is remotely accessing the
computer during nighttime hours.

Which type of malware is likely found in the CD/DVD software?

a. Virus

b. Adware

c. Worm

d. Trojan horse - Correct Answer - d. Trojan horse



pg. 3

, A user is working on a home computer when another user seems to open an application to view
documents on the same computer. The user immediately suspects that a back door into the computer
exists.Which action should be taken first to deal with the problem?

a. Close the application the remote user opened

b. Begin running antivirus scans

c. Unplug the PC's network connection

d. Open task manager to determine which applications are running - Correct Answer - c. Unplug
the PC's network connection



Which Internet access technology uses ordinary telephone wires for data transmission? a.

DSL

b. Cable

c. Wi-Fi

d. Hotspot - Correct Answer - DSL



Which device is used to organize network cables as they run between switches and other network
devices?

a. Jack

b. Hub

c. Patch Panel

d. Router - Correct Answer - Patch Panel



Which network device is used to connect two or more network segments by performing OSI layer 3
functions like packet-forwarding?

a. Router

b. Repeater

c. Wire

d. Switch - Correct Answer - Router




pg. 4

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ASSIGNMENT7 Walden University
View profile
Follow You need to be logged in order to follow users or courses
Sold
445
Member since
1 year
Number of followers
18
Documents
2923
Last sold
13 hours ago
ACTUAL EXAMS, EXAM REVIEW AND STUDY GUIDE PLUG.

UNLOCK YOUR ACADEMIC SUCCESS, GAIN ACCESS TO EXPERTLY CRAFTED ACTUAL EXAMS, FLASHCARDS, TESTBANKS AND STUDY GUIDES ON THIS ACCOUNT, ELEVATE YOUR LEARNING EXPERIENCE AND ACHIEVE TOP GRADES WITH MY COMPREHENSIVE AND TIME SAVING RESOURCE. WISHING YOU GOOD LUCK IN YOUR EXAMS!!

4.0

90 reviews

5
40
4
21
3
22
2
2
1
5

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions