Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D315 Network and Security foundation Exam Preparation Questions and Assured Success Solutions Newly updates 2024/2025

Rating
-
Sold
-
Pages
24
Grade
A+
Uploaded on
23-04-2025
Written in
2024/2025

WGU D315 Network and Security foundation Exam Preparation Questions and Assured Success Solutions Newly updates 2024/2025 Which type of firewall technology reads and analyzes the actual content of a message before forwarding to its destination? - correct answer Proxy servers An organization's IT department is concerned that malicious insiders may be using elevated access rights. Which security control can be used to draw attacks away from critical systems? - correct answer Honeypots What is end-to-end encryption? - correct answer Data is encrypted on the sender's system and only the recipient is able to decrypt it. Which phrase describes unencrypted data? - correct answer In the clear An adminstrator fails to configure protection for usernames and passwords transmitted across the network. Which component of the AAA model is weakened? - correct answer Authentication A user is mistakenly granted access to customer accounts not required for his duties. Which component of the AAA model is violated? - correct answer Authorization Blue Team - correct answer The defensive team in a penetration test or incident response exercise. Red Team - correct answer The "hostile" or attacking team in a penetration test or incident response exercise. White Team - correct answer A neutral team of employees acting as observers, referees, and judges between a red team and a blue team. Purple Team - correct answer A mode of penetration testing where red and blue teams share information and collaborate throughout the engagement. White Hat Hacker - correct answer Someone who uncovers computer weaknesses without exploiting them. The goal of the white hat hacker is to improve system security. Ethical Hacker Black Hat - correct answer A hacker who exposes vulnerabilities for financial gain or for some malicious purpose.

Show more Read less
Institution
WGU D 315 Network And Security Foundation
Course
WGU D 315 Network and Security foundation

Content preview

WGU D315 Network and Security foundation Exam
Preparation Questions and Assured Success
Solutions Newly updates 2024/2025

Which type of firewall technology reads and analyzes the actual content of a message
before forwarding to its destination? - correct answer Proxy servers


An organization's IT department is concerned that malicious insiders may be using
elevated access rights. Which security control can be used to draw attacks away from
critical systems? - correct answer Honeypots


What is end-to-end encryption? - correct answer Data is encrypted on the sender's
system and only the recipient is able to decrypt it.


Which phrase describes unencrypted data? - correct answer In the clear


An adminstrator fails to configure protection for usernames and passwords transmitted
across the network. Which component of the AAA model is weakened? - correct
answer Authentication


A user is mistakenly granted access to customer accounts not required for his duties.
Which component of the AAA model is violated? - correct answer Authorization


Blue Team - correct answer The defensive team in a penetration test or incident
response exercise.


Red Team - correct answer The "hostile" or attacking team in a penetration test or
incident response exercise.


White Team - correct answer A neutral team of employees acting as observers,
referees, and judges between a red team and a blue team.

,Purple Team - correct answer A mode of penetration testing where red and blue teams
share information and collaborate throughout the engagement.


White Hat Hacker - correct answer Someone who uncovers computer weaknesses
without exploiting them. The goal of the white hat hacker is to improve system security.
Ethical Hacker


Black Hat - correct answer A hacker who exposes vulnerabilities for
financial gain or for some malicious purpose.


Gray Hat Hacker - correct answer This in-between hacker uses illegal and/or unethical
means to discover a system's security vulnerabilities. Don't have permission to hack but
may not be malicious


Script Kiddies - correct answer Individuals who want to break into computers to create
damage, yet lack the advanced knowledge of computers and networks needed to do so.


Malware - correct answer software that is intended to damage or disable computers
and computer systems. Any malicious code


Phishing - correct answer An attack that sends an email or displays a Web
announcement that falsely claims to be from a legitimate enterprise in an attempt to trick
the user into surrendering private information


Wiretapping - correct answer attacker listens to the network activity so that they can
capture information and data packets off the network


Packet Sniffing - correct answer Allows you to obtain anything being sent over a
network if the data being transmitted isn't encrypted

, Port Scanning Attack - correct answer An attack where an attacker scans your systems
to see which ports are listening in an attempt to find a way to gain unauthorized access.


SQL injection attack - correct answer inserting a malicious SQL query in input such
that it is passed to and executed by an application program


Buffer Overflow Attack - correct answer Inputting so much data that the input buffer
overflows. The overflow contains code that takes control of the computer.


Spoofing Attack - correct answer An attempt by someone or something to masquerade
as someone else.


Man-in-the-Middle Attack (MITM) - correct answer A hacker placing himself between a
client and a host to intercept network traffic; also called session hijacking.


Denial of Service (DoS) - correct answer Security problem in which users are not able
to access an information system; can be caused by human errors, natural disaster, or
malicious activity.


Ping Flood Attack - correct answer Ping utility used to send large number of echo
request messages and overwhelms server


Smurf Attack (ICMP Flood) - correct answer Sends a forged ICMP echo-request
packet to the broadcast address of a large IP subnet and all computers on the network
reply to the victim


social engineering attack - correct answer A type of attack where the goal is to obtain
sensitive data, including user names and
passwords, from network users through
deception and trickery.

Written for

Institution
WGU D 315 Network and Security foundation
Course
WGU D 315 Network and Security foundation

Document information

Uploaded on
April 23, 2025
Number of pages
24
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$10.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
KieranKent55 NONE
View profile
Follow You need to be logged in order to follow users or courses
Sold
43
Member since
2 year
Number of followers
18
Documents
6452
Last sold
2 months ago

3.6

9 reviews

5
4
4
1
3
2
2
0
1
2

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions