100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C182 EXAM WITH COMPLETE SOLUTIONS 100% VERIFIED !!

Rating
-
Sold
-
Pages
74
Grade
A+
Uploaded on
31-01-2025
Written in
2024/2025

WGU C182 EXAM WITH COMPLETE SOLUTIONS 100% VERIFIED !!...

Institution
WGU C182
Course
WGU C182

Content preview

WGU C182 EXAM WITH COMPLETE SOLUTIONS 100%
VERIFIED 2025-2026!!



What is a DNS server? - ANSWER>>A server that has a table that contains Host IP
addresses and aliases. When given an Internet alias the DNS looks the entry up in its
own DNS table and returns the corresponding IP address. If it is not found in the first
DNS server it forwards up the chain until it can be.



Describe what packets do. - ANSWER>> Your computer takes your message and
packages it up into one or more packets. If the message is short, it can go in one packet.
If not, it might be put into multiple packets. Each packet is given the destination address
(an IP alias). A checksum is computed from other data contained within the IP packet
and stored as part of the IP packet. When the packet reaches its destination, the
checksum is recalculated and the two are compared. If they are the same, the integrity
of the message is assured.



How does a packet get to where it is going? - ANSWER>>Once the IP address has been
supplied, the packets are sent out. They are routed from your computer to your site's
Internet point of presence or gateway. The message is routed from the current LAN to
this gateway. The server sends each packet along a pathway that connects it to the
Internet. Each packet finds its own way across the Internet by going from one router to
another. Each router selects the next path based on the destination address and the
current message traffic along the various paths available. Upon arriving at the remote
site, this destination IP address may or may not be the actual IP address of the host
device.



When the message finally arrives at the remote site, if NAT is used, this IP address may
be translated from an "external public" to an "internal private" IP address. And now with
the internal private address, the message continues to be routed internally to the
destination network and finally, by switch to the destination computer. What tool can be
used to test a pack takes from start to finish? - ANSWER>>Traceroute

,What does IAS stand for? - ANSWER>>Information Assurance and Security



What are the three goals of IAS? - ANSWER>>CIA - Confidentiality, Integrity and
Availability



What is Confidentiality? - ANSWER>>Requires that data be kept secure so that they
are not accidentally provided to unauthorized individuals and cannot be obtained by
unauthorized users.



What is Integrity? - ANSWER>>Requires that data are correct. This requires at a
minimum three different efforts. First, data gathering must include a component that
ensures the accuracy of the collected data. Second, data must be entered into the
system accurately. Third, and most importantly, data modification must be tracked.



What is Availability? - ANSWER>>Requires that information is available when needed



What is the first step in a Risk Assessment? - ANSWER>>Identify the organization's
information assets. These are physical assets, intellectual property and information.



What is Public information? - ANSWER>>Might include names and addresses (since
this information is available through the phone book).



What is Sensitive information? ANSWER>>May contain e-mail addresses. While this is
not considered public information, it is information which, if others were to come to
know of it, would not be viewed as a threat to a person's privacy. Not public, yet not
harmful. Usually for Individuals.



What is Private information? - ANSWER>>Information that could be a threat if
disclosed to others such as social security and credit card numbers, or health and
education information. This information is often protected from disclosure by federal
legislation. Not public, harmful. Typically for Individuals.



What is Confidential information? - ANSWER>>Consists of information that an

,organization will keep secret, such as patentable information and business plans.
Typically for a Business.



What other types of information may the Government have? - ANSWER>>Secret, Top
Secret



What is the second step of Risk Assessment? - ANSWER>>To identify vulnerabilities of
each asset.



What is the third step of Risk Assessment? - ANSWER>>Identifying threats for the
vulnerabilities.



What is the fourth step of Risk Assessment? - ANSWER>>Prioritizing the risks



What is the last step of Risk Assessment? - ANSWER>>Developing policies



What is data integrity? - ANSWER>>When data cannot be changed/manipulated while it
resides on a host or travels across a network, or if it is changed, manipulated, then the
change can be detected.



What is Social Engineering? - ANSWER>>A threat that targets users. The idea is that a
user is a weak link who can be tricked, and often fairly easily.



What are some types of Social Engineering? - ANSWER>>Phishing, using Post-It notes
for you password, when a person pays very close attention to you that normally
wouldn't.



What are two common forms of software exploits? - ANSWER>>Buffer overflows and
SQL Injection



What is SQL Injection? - ANSWER>>An attacker sends an SQL command to a web

, server as part of the URL or as input to a form on a company's website



What is a buffer overflow exploit?



- ANSWER>>Perhaps one of the oldest and well known forms of software exploit;
software programmers should be able to protect against this when they write software.
The buffer is of limited size. If the software does not ensure that insertions into the
buffer are limited to in size, then it is possible to insert into the buffer a sufficient amount
so that the memory locations after the array are filled as well. What are the different
types of Hacking? - ANSWER>>Black Hat, White Hat and Grey Hat



What is a White Hat hacker? - ANSWER>>A security expert, doing it for good



What is a Black Hat hacker? - ANSWER>>One hacking for malicious intent



What is a Grey Hat hacker? - ANSWER>>A person who performs both White and Black
Hat hacking.



What is packet sniffing? - ANSWER>>A means of obtaining a password; actually,
besides passwords, packet sniffing allows you to get anything being transmitted over
the network if only the data being sent is without encryption.



What is Malware? - ANSWER>>There are different types of malware, but usually this
refers to two types: viruses or worms.



What is a Virus? - ANSWER>>Software that attaches itself to another legitimate or
apparently legitimate software application.



What is a Worm? - ANSWER>>Are self-contained programs and do not require other
programs to propagate across computers and computer networks.

Written for

Institution
WGU C182
Course
WGU C182

Document information

Uploaded on
January 31, 2025
Number of pages
74
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • wgu c182

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Chrisyuis West Virginia University
View profile
Follow You need to be logged in order to follow users or courses
Sold
8
Member since
1 year
Number of followers
2
Documents
1587
Last sold
1 hour ago

5.0

3 reviews

5
3
4
0
3
0
2
0
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions