100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D315 - PRE-ASSESSMENT: NETWORK AND SECURITY - FOUNDATIONS

Rating
-
Sold
-
Pages
58
Grade
A+
Uploaded on
13-11-2024
Written in
2024/2025

WGU D315 - PRE-ASSESSMENT: NETWORK AND SECURITY - FOUNDATIONS .A ______ is a device that connects two or more packet-switched networks or subnetworks. It serves two primary functions: managing traffic between these networks by forwarding data packets to their intended IP addresses, and allowing multiple devices to use the same internet connection. - ANSWER-Router .A _______ attack send TCP/IP traffic to each and every port to learn which services are running. Spoofing Port scanning Ping flood SQL Injection - ANSWER-Port Scanning .A bridge _________________________________________________ a. connects wireless devices to the network using AES b. connects storage systems using IP based connections c. connects two networks by forwarding traffic without analysis for which host receives the data d. provides a direct connection to devices on the same network - ANSWER-c. connects two networks by forwarding traffic without analysis for which host receives the data .A company has the policy that all new user passwords are P@ssw0rd but does not require new users to change their password. An employee randomly tries a coworker's account with the new user password to see if they can log in as the coworker. Which type of vulnerability does this create? a. BYOD b. Weak password c. Default password d. Misconfigured firewall rules - ANSWER-Default password .A company is concerned with traffic that flows through the network. There is a concern that there may be malware that exists that is not being blocked or eradicated by antivirus. What technology can be put in place to detect potential malware traffic on the network? IDS firewall Honeypot NAC - ANSWER-IDS .A company needs to secure the network using a security system that can inspect the network traffic's payload to prevent attacks. What type of firewall would you recommend? Application Firewall Stateful Firewall Packet Filtering Layer 3 or 4 Firewall - ANSWER-Application Firewall .A company provides access to employees' tax and personal information via a public-facing web portal. What should the company implement to encrypt employees' web access to this information? a. Transport layer security (TLS) b. Network intrusion detection system (NIDS) c. Advanced encryption standard (AES) d. Two-factor authentication (2FA) - ANSWER-a. Transport layer security (TLS) .A cybersecurity specialist is asked to identify the potential criminals known to attack the organization. Which type of hackers would the cybersecurity specialist be least concerned with? Gray hat hackers Black hat hackers Script kiddies White hat hackers - ANSWER-White hat hackers .A hub is the device of choice to decrease traffic on a network segment. True False - ANSWER-False .A malicious user was able to lock a user's account after guessing the user's password multiple times unsuccessfully. Which category of the CIA triad did the malicious user target in this attack? a. Confidentiality b. Integrity c. Availability d. Accessibility - ANSWER-c. Availability .A malicious user was able to perform a password brute force attack on a human resource email account and is now reading through all their emails. Which category of the CIA triad was compromised? Authentication Confidentiality Availability Integrity - ANSWER-Confidentiality .A network admin is configuring an application and needs to be sure that port 4432 is open what tool should the admin use? Ping netstat nmap TCP_Function - ANSWER-nmap (Network Mapper) It is an open-source Linux command-line tool that is used to scan IP addresses and ports in a network and to detect installed applications. .A router is a Layer 3 device. True False - ANSWER-True .A stateful firewall uses Stateful Packet Inspection to protect the network. How does this type of firewall operate? a. A stateful firewall uses a list to allow connections b. A stateful firewall makes requests on behalf of other systems on a Network c. A stateful firewall that compares all inbound traffic to ensure there is an outbound request. d. A stateful firewall that compares IP addresses to a block list to deny connections - ANSWER-c. A stateful firewall that compares all inbound traffic to ensure there is an outbound request. .A switch forwards data only to the port that are connected to the destination device. It knows which port to forward it to based on which value?* Conf value IP address Port Number MAC Address - ANSWER-MAC Address .A switch is a Layer 1 device and unlike a hub it creates a direct connection to devices on the network. True False - ANSWER-False .A third world country has solicited the services of several hackers to perform an attack on the U.S. treasury department? Which time of attack would this be classified as? Nation State Espionage Industrial Espionage International Espionage World Espionage - ANSWER-Nation State Espionage .A user is mistakenly granted access to customer accounts not required for his duties. Which component of the AAA model is violated? a. Authentication b. Authorization c. Availability d. Access - ANSWER-b. Authorization

Show more Read less
Institution
WGU D315 - PRE-ASSESSMENT
Course
WGU D315 - PRE-ASSESSMENT











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D315 - PRE-ASSESSMENT
Course
WGU D315 - PRE-ASSESSMENT

Document information

Uploaded on
November 13, 2024
Number of pages
58
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D315 - PRE-ASSESSMENT: NETWORK AND
SECURITY - FOUNDATIONS
.A ______ is a device that connects two or more packet-switched networks or subnetworks. It serves two
primary functions: managing traffic between these networks by forwarding data packets to their intended IP
addresses, and allowing multiple devices to use the same internet connection. - ANSWER-Router



.A _______ attack send TCP/IP traffic to each and every port to learn which services are running.



Spoofing

Port scanning

Ping flood

SQL Injection - ANSWER-Port Scanning



.A bridge _________________________________________________

a. connects wireless devices to the network using AES

b. connects storage systems using IP based connections

c. connects two networks by forwarding traffic without analysis for which host receives the data

d. provides a direct connection to devices on the same network - ANSWER-c. connects two networks by
forwarding traffic without analysis for which host receives the data



.A company has the policy that all new user passwords are P@ssw0rd but does not require new users to
change their password. An employee randomly tries a coworker's account with the new user password to see if
they can log in as the coworker. Which type of vulnerability does this create?



a. BYOD

b. Weak password

c. Default password

,d. Misconfigured firewall rules - ANSWER-Default password



.A company is concerned with traffic that flows through the network. There is a concern that there may be
malware that exists that is not being blocked or eradicated by antivirus. What technology can be put in place to
detect potential malware traffic on the network?



IDS

firewall

Honeypot

NAC - ANSWER-IDS



.A company needs to secure the network using a security system that can inspect the network traffic's payload
to prevent attacks. What type of firewall would you recommend?



Application Firewall

Stateful Firewall

Packet Filtering

Layer 3 or 4 Firewall - ANSWER-Application Firewall



.A company provides access to employees' tax and personal information via a public-facing web portal. What
should the company implement to encrypt employees' web access to this information?



a. Transport layer security (TLS)

b. Network intrusion detection system (NIDS)

c. Advanced encryption standard (AES)

d. Two-factor authentication (2FA) - ANSWER-a. Transport layer security (TLS)



.A cybersecurity specialist is asked to identify the potential criminals known to attack the organization. Which
type of hackers would the cybersecurity specialist be least concerned with?

,Gray hat hackers

Black hat hackers

Script kiddies

White hat hackers - ANSWER-White hat hackers



.A hub is the device of choice to decrease traffic on a network segment.



True

False - ANSWER-False



.A malicious user was able to lock a user's account after guessing the user's password multiple times
unsuccessfully.

Which category of the CIA triad did the malicious user target in this attack?



a. Confidentiality

b. Integrity

c. Availability

d. Accessibility - ANSWER-c. Availability



.A malicious user was able to perform a password brute force attack on a human resource email account and is
now reading through all their emails. Which category of the CIA triad was compromised?



Authentication

Confidentiality

Availability

Integrity - ANSWER-Confidentiality

, .A network admin is configuring an application and needs to be sure that port 4432 is open what tool should
the admin use?



Ping

netstat

nmap

TCP_Function - ANSWER-nmap (Network Mapper)



It is an open-source Linux command-line tool that is used to scan IP addresses and ports in a network and to
detect installed applications.



.A router is a Layer 3 device.



True

False - ANSWER-True



.A stateful firewall uses Stateful Packet Inspection to protect the network. How does this type of firewall
operate?



a. A stateful firewall uses a list to allow connections

b. A stateful firewall makes requests on behalf of other systems on a Network

c. A stateful firewall that compares all inbound traffic to ensure there is an outbound request.

d. A stateful firewall that compares IP addresses to a block list to deny connections - ANSWER-c. A stateful
firewall that compares all inbound traffic to ensure there is an outbound request.



.A switch forwards data only to the port that are connected to the destination device. It knows which port to
forward it to based on which value?*
$24.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
BESTPRICE

Get to know the seller

Seller avatar
BESTPRICE EXAMS
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
1 year
Number of followers
0
Documents
36
Last sold
-
BESTPRICE

Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers. We specialize on NURSING,WGU,ACLS USMLE,TNCC,PMHNP,ATI and other major courses, Updated Exam, Study Guides and Test banks. If you don't find any document you are looking for in this store contact us and we will fetch it for you in minutes, we love impressing our clients with our quality work and we are very punctual on deadlines. Please go through the sets description appropriately before any purchase and leave a review after purchasing so as to make sure our customers are 100% satisfied. I WISH YOU SUCCESS IN YOUR EDUCATION JOURNEY

Read more Read less
0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions