WGU C182 EXAM WITH COMPLETE SOLUTIONS 100%
VERIFIED 2025-2026!!
What is a DNS server? - ANSWER>>A server that has a table that contains Host IP
addresses and aliases. When given an Internet alias the DNS looks the entry up in its
own DNS table and returns the corresponding IP address. If it is not found in the first
DNS server it forwards up the chain until it can be.
Describe what packets do. - ANSWER>> Your computer takes your message and
packages it up into one or more packets. If the message is short, it can go in one packet.
If not, it might be put into multiple packets. Each packet is given the destination address
(an IP alias). A checksum is computed from other data contained within the IP packet
and stored as part of the IP packet. When the packet reaches its destination, the
checksum is recalculated and the two are compared. If they are the same, the integrity
of the message is assured.
How does a packet get to where it is going? - ANSWER>>Once the IP address has been
supplied, the packets are sent out. They are routed from your computer to your site's
Internet point of presence or gateway. The message is routed from the current LAN to
this gateway. The server sends each packet along a pathway that connects it to the
Internet. Each packet finds its own way across the Internet by going from one router to
another. Each router selects the next path based on the destination address and the
current message traffic along the various paths available. Upon arriving at the remote
site, this destination IP address may or may not be the actual IP address of the host
device.
When the message finally arrives at the remote site, if NAT is used, this IP address may
be translated from an "external public" to an "internal private" IP address. And now with
the internal private address, the message continues to be routed internally to the
destination network and finally, by switch to the destination computer. What tool can be
used to test a pack takes from start to finish? - ANSWER>>Traceroute
,What does IAS stand for? - ANSWER>>Information Assurance and Security
What are the three goals of IAS? - ANSWER>>CIA - Confidentiality, Integrity and
Availability
What is Confidentiality? - ANSWER>>Requires that data be kept secure so that they
are not accidentally provided to unauthorized individuals and cannot be obtained by
unauthorized users.
What is Integrity? - ANSWER>>Requires that data are correct. This requires at a
minimum three different efforts. First, data gathering must include a component that
ensures the accuracy of the collected data. Second, data must be entered into the
system accurately. Third, and most importantly, data modification must be tracked.
What is Availability? - ANSWER>>Requires that information is available when needed
What is the first step in a Risk Assessment? - ANSWER>>Identify the organization's
information assets. These are physical assets, intellectual property and information.
What is Public information? - ANSWER>>Might include names and addresses (since
this information is available through the phone book).
What is Sensitive information? ANSWER>>May contain e-mail addresses. While this is
not considered public information, it is information which, if others were to come to
know of it, would not be viewed as a threat to a person's privacy. Not public, yet not
harmful. Usually for Individuals.
What is Private information? - ANSWER>>Information that could be a threat if
disclosed to others such as social security and credit card numbers, or health and
education information. This information is often protected from disclosure by federal
legislation. Not public, harmful. Typically for Individuals.
What is Confidential information? - ANSWER>>Consists of information that an
,organization will keep secret, such as patentable information and business plans.
Typically for a Business.
What other types of information may the Government have? - ANSWER>>Secret, Top
Secret
What is the second step of Risk Assessment? - ANSWER>>To identify vulnerabilities of
each asset.
What is the third step of Risk Assessment? - ANSWER>>Identifying threats for the
vulnerabilities.
What is the fourth step of Risk Assessment? - ANSWER>>Prioritizing the risks
What is the last step of Risk Assessment? - ANSWER>>Developing policies
What is data integrity? - ANSWER>>When data cannot be changed/manipulated while it
resides on a host or travels across a network, or if it is changed, manipulated, then the
change can be detected.
What is Social Engineering? - ANSWER>>A threat that targets users. The idea is that a
user is a weak link who can be tricked, and often fairly easily.
What are some types of Social Engineering? - ANSWER>>Phishing, using Post-It notes
for you password, when a person pays very close attention to you that normally
wouldn't.
What are two common forms of software exploits? - ANSWER>>Buffer overflows and
SQL Injection
What is SQL Injection? - ANSWER>>An attacker sends an SQL command to a web
, server as part of the URL or as input to a form on a company's website
What is a buffer overflow exploit?
- ANSWER>>Perhaps one of the oldest and well known forms of software exploit;
software programmers should be able to protect against this when they write software.
The buffer is of limited size. If the software does not ensure that insertions into the
buffer are limited to in size, then it is possible to insert into the buffer a sufficient amount
so that the memory locations after the array are filled as well. What are the different
types of Hacking? - ANSWER>>Black Hat, White Hat and Grey Hat
What is a White Hat hacker? - ANSWER>>A security expert, doing it for good
What is a Black Hat hacker? - ANSWER>>One hacking for malicious intent
What is a Grey Hat hacker? - ANSWER>>A person who performs both White and Black
Hat hacking.
What is packet sniffing? - ANSWER>>A means of obtaining a password; actually,
besides passwords, packet sniffing allows you to get anything being transmitted over
the network if only the data being sent is without encryption.
What is Malware? - ANSWER>>There are different types of malware, but usually this
refers to two types: viruses or worms.
What is a Virus? - ANSWER>>Software that attaches itself to another legitimate or
apparently legitimate software application.
What is a Worm? - ANSWER>>Are self-contained programs and do not require other
programs to propagate across computers and computer networks.
VERIFIED 2025-2026!!
What is a DNS server? - ANSWER>>A server that has a table that contains Host IP
addresses and aliases. When given an Internet alias the DNS looks the entry up in its
own DNS table and returns the corresponding IP address. If it is not found in the first
DNS server it forwards up the chain until it can be.
Describe what packets do. - ANSWER>> Your computer takes your message and
packages it up into one or more packets. If the message is short, it can go in one packet.
If not, it might be put into multiple packets. Each packet is given the destination address
(an IP alias). A checksum is computed from other data contained within the IP packet
and stored as part of the IP packet. When the packet reaches its destination, the
checksum is recalculated and the two are compared. If they are the same, the integrity
of the message is assured.
How does a packet get to where it is going? - ANSWER>>Once the IP address has been
supplied, the packets are sent out. They are routed from your computer to your site's
Internet point of presence or gateway. The message is routed from the current LAN to
this gateway. The server sends each packet along a pathway that connects it to the
Internet. Each packet finds its own way across the Internet by going from one router to
another. Each router selects the next path based on the destination address and the
current message traffic along the various paths available. Upon arriving at the remote
site, this destination IP address may or may not be the actual IP address of the host
device.
When the message finally arrives at the remote site, if NAT is used, this IP address may
be translated from an "external public" to an "internal private" IP address. And now with
the internal private address, the message continues to be routed internally to the
destination network and finally, by switch to the destination computer. What tool can be
used to test a pack takes from start to finish? - ANSWER>>Traceroute
,What does IAS stand for? - ANSWER>>Information Assurance and Security
What are the three goals of IAS? - ANSWER>>CIA - Confidentiality, Integrity and
Availability
What is Confidentiality? - ANSWER>>Requires that data be kept secure so that they
are not accidentally provided to unauthorized individuals and cannot be obtained by
unauthorized users.
What is Integrity? - ANSWER>>Requires that data are correct. This requires at a
minimum three different efforts. First, data gathering must include a component that
ensures the accuracy of the collected data. Second, data must be entered into the
system accurately. Third, and most importantly, data modification must be tracked.
What is Availability? - ANSWER>>Requires that information is available when needed
What is the first step in a Risk Assessment? - ANSWER>>Identify the organization's
information assets. These are physical assets, intellectual property and information.
What is Public information? - ANSWER>>Might include names and addresses (since
this information is available through the phone book).
What is Sensitive information? ANSWER>>May contain e-mail addresses. While this is
not considered public information, it is information which, if others were to come to
know of it, would not be viewed as a threat to a person's privacy. Not public, yet not
harmful. Usually for Individuals.
What is Private information? - ANSWER>>Information that could be a threat if
disclosed to others such as social security and credit card numbers, or health and
education information. This information is often protected from disclosure by federal
legislation. Not public, harmful. Typically for Individuals.
What is Confidential information? - ANSWER>>Consists of information that an
,organization will keep secret, such as patentable information and business plans.
Typically for a Business.
What other types of information may the Government have? - ANSWER>>Secret, Top
Secret
What is the second step of Risk Assessment? - ANSWER>>To identify vulnerabilities of
each asset.
What is the third step of Risk Assessment? - ANSWER>>Identifying threats for the
vulnerabilities.
What is the fourth step of Risk Assessment? - ANSWER>>Prioritizing the risks
What is the last step of Risk Assessment? - ANSWER>>Developing policies
What is data integrity? - ANSWER>>When data cannot be changed/manipulated while it
resides on a host or travels across a network, or if it is changed, manipulated, then the
change can be detected.
What is Social Engineering? - ANSWER>>A threat that targets users. The idea is that a
user is a weak link who can be tricked, and often fairly easily.
What are some types of Social Engineering? - ANSWER>>Phishing, using Post-It notes
for you password, when a person pays very close attention to you that normally
wouldn't.
What are two common forms of software exploits? - ANSWER>>Buffer overflows and
SQL Injection
What is SQL Injection? - ANSWER>>An attacker sends an SQL command to a web
, server as part of the URL or as input to a form on a company's website
What is a buffer overflow exploit?
- ANSWER>>Perhaps one of the oldest and well known forms of software exploit;
software programmers should be able to protect against this when they write software.
The buffer is of limited size. If the software does not ensure that insertions into the
buffer are limited to in size, then it is possible to insert into the buffer a sufficient amount
so that the memory locations after the array are filled as well. What are the different
types of Hacking? - ANSWER>>Black Hat, White Hat and Grey Hat
What is a White Hat hacker? - ANSWER>>A security expert, doing it for good
What is a Black Hat hacker? - ANSWER>>One hacking for malicious intent
What is a Grey Hat hacker? - ANSWER>>A person who performs both White and Black
Hat hacking.
What is packet sniffing? - ANSWER>>A means of obtaining a password; actually,
besides passwords, packet sniffing allows you to get anything being transmitted over
the network if only the data being sent is without encryption.
What is Malware? - ANSWER>>There are different types of malware, but usually this
refers to two types: viruses or worms.
What is a Virus? - ANSWER>>Software that attaches itself to another legitimate or
apparently legitimate software application.
What is a Worm? - ANSWER>>Are self-contained programs and do not require other
programs to propagate across computers and computer networks.