WGU D315 - PRE-ASSESSMENT: NETWORK AND SECURITY
n n n n n n
–
FOUNDATIONS/ Updated Questions with Correct Answers -
n n n n n n n
Latest 2024.
n
Whichntypenofnattacknexploitsnannunpatchednsoftwarenvulnerability?
a. Zero-day
b. Brue-force
c. Diffie-Hellman
d. Man-in-the-middlen-nCorrectnAnswern-nZero-day
AncompanynhasnthenpolicynthatnallnnewnusernpasswordsnarenP@ssw0rdnbutndoesnnotnrequirennewnusersnto
nchangentheirnpassword.nAnnemployeenrandomlyntriesnancoworker'snaccountnwithnthennewnusernpasswor
dntonseenifntheyncannlogninnasnthencoworker.nWhichntypenofnvulnerabilityndoesnthisncreate?
a. BYOD
b. Weaknpassword
c. Defaultnpassword
d. Misconfigurednfirewallnrulesn-nCorrectnAnswern-nDefaultnpassword
Annemployeenthatndoesnnotnwantntonmissnemailsnfromnimportantnclientsnsetsnupnherncellularnsmartphone
ntonallownherntonchecknemail.nUnfortunately,nshendoesnnotninstallnantivirusnsoftwarenonnthencellularnphone
.nWhatntypenofnvulnerabilitynisnrepresented?
a. Industrynthreat
b. Misconfiguredn firewalln rules
c. Weaknpasswords
d. BYOD/Mobilen-nCorrectnAnswern-nBYOD/Mobile
Whatnisnthendefinitionnofnvulnerability,ninncomputernsecurity?
a. Itnisnanweaknessnwhichncannbenexploitednbynanthreat,nsuchnasnannattacker,ntonperformnunauthorize
dnactionsnwithinnancomputernsystem.
,pg.n1
,b. Itnisnanpossiblendangernthatnmightnexploitnanweaknessntonbreachnsecuritynandnthereforencause
npossiblenharm.
c. Itnisnannactionntakennbynanthreatnthatnexploitsnanweaknessnthatnattemptsntoneithernblocknauthorized
naccessntonannassetnorntongainnunauthorizednaccessntonannasset.
d. Itnisnthenpotentialnofnanthreatntonexploitnanweaknessnvianannattack.n-nCorrectnAnswern-
nItnisnanweaknessnwhichncannbenexploitednbynanthreat,nsuchnasnannattacker,ntonperformnunauthorizedn
actionsnwithinnancomputernsystem.
Whatnisnrequiredntonestablishnansecurenconnectionntonanremotennetworknovernanninsecurenlink?
a. VirtualnPrivatenNetworkn(VPN)nservice
b. Linux
c. CommandnLinenInterface
d. TORnNetworkn-nCorrectnAnswern-nVirtualnPrivatenNetworkn(VPN)nservice
Annorganizationnisnconcernednaboutnbrutenforcenattacks.nHo
wnshouldnthenorganizationncounternthisnrisk?
a. Installnanmantrapnandnbiometricnscannernatnthenentrancenofnitsndatancenter.
b. Implementnansystemnhardeningnpolicynthatnensuresnoperatingnsystemnupdatesnandnsoftware
npatchesnareninstallednregularly.
c. Institutenanlog-innpolicynthatnlocksnusersnoutnofnannaccountnafternthreenfailednpasswordnattempts.
d. Initiatenrole-basednaccessntonitsnsystemsntonreducenthenpossibilitynofnescalatednprivileges.n-
nCorrectnAnswern-nc.nInstitutenanlog-
innpolicynthatnlocksnusersnoutnofnannaccountnafternthreenfailednpassword
attempts.
Annorganizationnsuffersnansocialnengineeringnattacknthatnresultsninnancybercriminalngainingnaccessntonitsnnet
worksnandntonitsncustomers'nprivateninformation.
Howncannthenorganizationnmitigatenthisnriskninnthenfuture?
a. Updatenusernantivirusnsoftwarentonthenlatestnversion
b. Implementnanstrongernpasswordnpolicy
c. Providenregularncybersecurityntrainingnfornemployees
d. Installnansophisticatednintrusionndetectionnsystemn-nCorrectnAnswern-
nc.nProvidenregularncybersecurityntrainingnfornemployees
pg.n2
, Annattackernplansntonexploitnflawsninnannoperatingnsystemntongainnaccessntonanuser'sncomputernsystem.nW
hatnisnanpreventionnmechanismnfornthisntypenofnattack?
a. Firewall
b. Patching
c. Antivirus
d. VirtualnPrivatenNetworkn(VPN)n-nCorrectnAnswern-nb.nPatching
Annunauthorizednthird-
partynhasngainednaccessntonancompanynnetwork.nHowncanntheynbenpreve
ntednfromndeletingndata?
a. Accessncontrols
b. Physicalncontrols
c. Biometrics
d. Manntrapn-nCorrectnAnswern-na.nAccessncontrols
Annattackernhasngainednaccessntonthenpasswordsnofnseveralnemployeesnofnancompanynthroughnanbrutenforce
nattack.nWhichnauthenticationnmethodnwouldnkeepnthenattackernfromnaccessingnthenemployees'ndevices?
a. MFAn(multi-factornauthentication)
b. AAAn(authentication,nauthorization,nandnaccounting)
c. PKIn(publicnkeyninfrastructure)
d. TCP/IPn(transmissionncontrolnprotocol/internetnprotocoln-nCorrectnAnswern-na.nMFAn(multi-
factornauthentication)
AfterndownloadingnanCD/DVDnburningnprogram,nanusernnoticesnthatnsomeonenisnremotelynaccessingnthenco
mputernduringnnighttimenhours.
WhichntypenofnmalwarenisnlikelynfoundninnthenCD/DVDnsoftware?
a. Virus
b. Adware
c. Worm
d. Trojannhorsen-nCorrectnAnswern-nd.nTrojannhorse
pg.n3
n n n n n n
–
FOUNDATIONS/ Updated Questions with Correct Answers -
n n n n n n n
Latest 2024.
n
Whichntypenofnattacknexploitsnannunpatchednsoftwarenvulnerability?
a. Zero-day
b. Brue-force
c. Diffie-Hellman
d. Man-in-the-middlen-nCorrectnAnswern-nZero-day
AncompanynhasnthenpolicynthatnallnnewnusernpasswordsnarenP@ssw0rdnbutndoesnnotnrequirennewnusersnto
nchangentheirnpassword.nAnnemployeenrandomlyntriesnancoworker'snaccountnwithnthennewnusernpasswor
dntonseenifntheyncannlogninnasnthencoworker.nWhichntypenofnvulnerabilityndoesnthisncreate?
a. BYOD
b. Weaknpassword
c. Defaultnpassword
d. Misconfigurednfirewallnrulesn-nCorrectnAnswern-nDefaultnpassword
Annemployeenthatndoesnnotnwantntonmissnemailsnfromnimportantnclientsnsetsnupnherncellularnsmartphone
ntonallownherntonchecknemail.nUnfortunately,nshendoesnnotninstallnantivirusnsoftwarenonnthencellularnphone
.nWhatntypenofnvulnerabilitynisnrepresented?
a. Industrynthreat
b. Misconfiguredn firewalln rules
c. Weaknpasswords
d. BYOD/Mobilen-nCorrectnAnswern-nBYOD/Mobile
Whatnisnthendefinitionnofnvulnerability,ninncomputernsecurity?
a. Itnisnanweaknessnwhichncannbenexploitednbynanthreat,nsuchnasnannattacker,ntonperformnunauthorize
dnactionsnwithinnancomputernsystem.
,pg.n1
,b. Itnisnanpossiblendangernthatnmightnexploitnanweaknessntonbreachnsecuritynandnthereforencause
npossiblenharm.
c. Itnisnannactionntakennbynanthreatnthatnexploitsnanweaknessnthatnattemptsntoneithernblocknauthorized
naccessntonannassetnorntongainnunauthorizednaccessntonannasset.
d. Itnisnthenpotentialnofnanthreatntonexploitnanweaknessnvianannattack.n-nCorrectnAnswern-
nItnisnanweaknessnwhichncannbenexploitednbynanthreat,nsuchnasnannattacker,ntonperformnunauthorizedn
actionsnwithinnancomputernsystem.
Whatnisnrequiredntonestablishnansecurenconnectionntonanremotennetworknovernanninsecurenlink?
a. VirtualnPrivatenNetworkn(VPN)nservice
b. Linux
c. CommandnLinenInterface
d. TORnNetworkn-nCorrectnAnswern-nVirtualnPrivatenNetworkn(VPN)nservice
Annorganizationnisnconcernednaboutnbrutenforcenattacks.nHo
wnshouldnthenorganizationncounternthisnrisk?
a. Installnanmantrapnandnbiometricnscannernatnthenentrancenofnitsndatancenter.
b. Implementnansystemnhardeningnpolicynthatnensuresnoperatingnsystemnupdatesnandnsoftware
npatchesnareninstallednregularly.
c. Institutenanlog-innpolicynthatnlocksnusersnoutnofnannaccountnafternthreenfailednpasswordnattempts.
d. Initiatenrole-basednaccessntonitsnsystemsntonreducenthenpossibilitynofnescalatednprivileges.n-
nCorrectnAnswern-nc.nInstitutenanlog-
innpolicynthatnlocksnusersnoutnofnannaccountnafternthreenfailednpassword
attempts.
Annorganizationnsuffersnansocialnengineeringnattacknthatnresultsninnancybercriminalngainingnaccessntonitsnnet
worksnandntonitsncustomers'nprivateninformation.
Howncannthenorganizationnmitigatenthisnriskninnthenfuture?
a. Updatenusernantivirusnsoftwarentonthenlatestnversion
b. Implementnanstrongernpasswordnpolicy
c. Providenregularncybersecurityntrainingnfornemployees
d. Installnansophisticatednintrusionndetectionnsystemn-nCorrectnAnswern-
nc.nProvidenregularncybersecurityntrainingnfornemployees
pg.n2
, Annattackernplansntonexploitnflawsninnannoperatingnsystemntongainnaccessntonanuser'sncomputernsystem.nW
hatnisnanpreventionnmechanismnfornthisntypenofnattack?
a. Firewall
b. Patching
c. Antivirus
d. VirtualnPrivatenNetworkn(VPN)n-nCorrectnAnswern-nb.nPatching
Annunauthorizednthird-
partynhasngainednaccessntonancompanynnetwork.nHowncanntheynbenpreve
ntednfromndeletingndata?
a. Accessncontrols
b. Physicalncontrols
c. Biometrics
d. Manntrapn-nCorrectnAnswern-na.nAccessncontrols
Annattackernhasngainednaccessntonthenpasswordsnofnseveralnemployeesnofnancompanynthroughnanbrutenforce
nattack.nWhichnauthenticationnmethodnwouldnkeepnthenattackernfromnaccessingnthenemployees'ndevices?
a. MFAn(multi-factornauthentication)
b. AAAn(authentication,nauthorization,nandnaccounting)
c. PKIn(publicnkeyninfrastructure)
d. TCP/IPn(transmissionncontrolnprotocol/internetnprotocoln-nCorrectnAnswern-na.nMFAn(multi-
factornauthentication)
AfterndownloadingnanCD/DVDnburningnprogram,nanusernnoticesnthatnsomeonenisnremotelynaccessingnthenco
mputernduringnnighttimenhours.
WhichntypenofnmalwarenisnlikelynfoundninnthenCD/DVDnsoftware?
a. Virus
b. Adware
c. Worm
d. Trojannhorsen-nCorrectnAnswern-nd.nTrojannhorse
pg.n3