100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C172 - Attacks, Threats, Risks, and Vulnerabilities questions with verified answers

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
28-02-2025
Written in
2024/2025

access mode (also called untagged mode) or trunk mode (also called tagging mode) Ans-configuring a switch with VLANs, the network administrator typically configures each switch port to operate in one of two modes: Application (7) Coding to prevent too much input.Firewall to prevent suspicious data from being sent. Enable NX-bit (no-execute) functionality on physical computer. Ans-The method used to mitigate a Buffer Overflow attack. Application (7) Review source code & validate all user-entered data. Firewall: use reverse proxy system and scan incoming packets for malicious behavior. Use web-application firewall with rules to filter dangerous requests. Enable NX-bit (no-execute) functionality on physical computer. Ans-The method used to mitigate an SQL Injection attack. ARP spoofing Ans-Which attack tricks a client into mapping an IP address to a spoofed MAC address? attacks occur in various OSI Layers. uses IP spoofing at its base, it goes a mile beyond that in order to gain control, by choosing sessions from one or more layers to be hijacked. Intrusion Prevention systems and IPSec can help. Ans-The method used to mitigate a Man in the Middle (MitM) attack.

Show more Read less









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
February 28, 2025
Number of pages
8
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C172 - Attacks, Threats, Risks, and Vulnerabilities
questions with verified answers
access mode (also called untagged mode) or trunk mode (also called tagging
mode) Ans✓✓✓-configuring a switch with VLANs, the network administrator
typically configures each switch port to operate in one of two modes:


Application (7)
Coding to prevent too much input.Firewall to prevent suspicious data from being
sent. Enable NX-bit (no-execute) functionality on physical computer. Ans✓✓✓-
The method used to mitigate a Buffer Overflow attack.


Application (7) Review source code & validate all user-entered data. Firewall: use
reverse proxy system and scan incoming packets for malicious behavior. Use web-
application firewall with rules to filter dangerous requests. Enable NX-bit (no-
execute) functionality on physical computer. Ans✓✓✓-The method used to
mitigate an SQL Injection attack.


ARP spoofing Ans✓✓✓-Which attack tricks a client into mapping an IP address to
a spoofed MAC address?


attacks occur in various OSI Layers. uses IP spoofing at its base, it goes a mile
beyond that in order to gain control, by choosing sessions from one or more
layers to be hijacked.
Intrusion Prevention systems and IPSec can help. Ans✓✓✓-The method used to
mitigate a Man in the Middle (MitM) attack.

, Buffer Overflow Ans✓✓✓-similar to SQL Injection but instead of SQL, they enter
too much information into the form which causes the app to crash or other
damage.


Data Link (2)
Configure the switch Access Control File per the vendor's recommendation.
Ans✓✓✓-The method used to mitigate a VLAN Hopping attack.


Database Control Ans✓✓✓-SQL Injection and Buffer Overflow


Deauth Attack (Deauthentication (abbreviated deauth)) Ans✓✓✓-a denial-of-
service (DoS) attack where the attacker can force any client (or even every client)
off of the network.


Denial of Service (DoS) Ans✓✓✓-Denying service to a computer, network or
network server by overwhelming the victim with large amounts of useless traffic.
One computer is used to flood a server with TCP and UDP packets.


Don't download attachments. Anti-virus software. Ans✓✓✓-How to protect/fight
Worms.


Insider Threats Ans✓✓✓-A disgruntled insider may have a motive. Whenever you
combine motive and opportunity, you have a substantially increased risk of
trouble.


Insider Threats Ans✓✓✓-Some of the most potent threats come from people
within your organization. Because they have legitimate access to systems, they
are in a position to hack from the inside of the network, often undetected.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
cracker Chamberlain School Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
2013
Member since
3 year
Number of followers
1342
Documents
46921
Last sold
1 day ago
✨ Cracker – Verified Study Powerhouse

Welcome to your shortcut to academic and certification success. I'm Cracker, a trusted top seller I specialize in high-quality study guides, test banks, certification prep, and real-world exam material all tailored to help you pass fast and score high.

3.8

368 reviews

5
162
4
84
3
51
2
22
1
49

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions