WGU D315 - PRE-ASSESSMENT: NETWORK AND SECURITY
u u u u u u
–
FOUNDATIONS/ Updated Questions with Correct Answers -
u u u u u u u
Latest 2024.
u
Whichutypeuofuattackuexploitsuanuunpatchedusoftwareuvulnerability?
a. Zero-day
b. Brue-force
c. Diffie-Hellman
d. Man-in-the-middleu-uCorrectuAnsweru-uZero-day
AucompanyuhasutheupolicyuthatuallunewuuserupasswordsuareuP@ssw0rdubutudoesunoturequireunewuusersuto
uchangeutheirupassword.uAnuemployeeurandomlyutriesuaucoworker'suaccountuwithutheunewuuserupasswor
dutouseeuifutheyucanuloguinuasutheucoworker.uWhichutypeuofuvulnerabilityudoesuthisucreate?
a. BYOD
b. Weakupassword
c. Defaultupassword
d. Misconfiguredufirewallurulesu-uCorrectuAnsweru-uDefaultupassword
Anuemployeeuthatudoesunotuwantutoumissuemailsufromuimportantuclientsusetsuupuherucellularusmartphone
utouallowuherutoucheckuemail.uUnfortunately,usheudoesunotuinstalluantivirususoftwareuonutheucellularuphone
.uWhatutypeuofuvulnerabilityuisurepresented?
a. Industryuthreat
b. Misconfiguredu firewallu rules
c. Weakupasswords
d. BYOD/Mobileu-uCorrectuAnsweru-uBYOD/Mobile
Whatuisutheudefinitionuofuvulnerability,uinucomputerusecurity?
a. Ituisuauweaknessuwhichucanubeuexploitedubyuauthreat,usuchuasuanuattacker,utouperformuunauthorize
duactionsuwithinuaucomputerusystem.
,pg.u1
,b. Ituisuaupossibleudangeruthatumightuexploituauweaknessutoubreachusecurityuanduthereforeucause
upossibleuharm.
c. Ituisuanuactionutakenubyuauthreatuthatuexploitsuauweaknessuthatuattemptsutoueitherublockuauthorized
uaccessutouanuassetuorutougainuunauthorizeduaccessutouanuasset.
d. Ituisutheupotentialuofuauthreatutouexploituauweaknessuviauanuattack.u-uCorrectuAnsweru-
uItuisuauweaknessuwhichucanubeuexploitedubyuauthreat,usuchuasuanuattacker,utouperformuunauthorizedu
actionsuwithinuaucomputerusystem.
Whatuisurequiredutouestablishuausecureuconnectionutouauremoteunetworkuoveruanuinsecureulink?
a. VirtualuPrivateuNetworku(VPN)uservice
b. Linux
c. CommanduLineuInterface
d. TORuNetworku-uCorrectuAnsweru-uVirtualuPrivateuNetworku(VPN)uservice
Anuorganizationuisuconcerneduaboutubruteuforceuattacks.uHo
wushouldutheuorganizationucounteruthisurisk?
a. Installuaumantrapuandubiometricuscanneruatutheuentranceuofuitsudataucenter.
b. Implementuausystemuhardeningupolicyuthatuensuresuoperatingusystemuupdatesuandusoftware
upatchesuareuinstalleduregularly.
c. Instituteuaulog-inupolicyuthatulocksuusersuoutuofuanuaccountuafteruthreeufailedupassworduattempts.
d. Initiateurole-baseduaccessutouitsusystemsutoureduceutheupossibilityuofuescalateduprivileges.u-
uCorrectuAnsweru-uc.uInstituteuaulog-
inupolicyuthatulocksuusersuoutuofuanuaccountuafteruthreeufailedupassword
attempts.
Anuorganizationusuffersuausocialuengineeringuattackuthaturesultsuinuaucybercriminalugaininguaccessutouitsunet
worksuandutouitsucustomers'uprivateuinformation.
Howucanutheuorganizationumitigateuthisuriskuinutheufuture?
a. Updateuuseruantivirususoftwareutoutheulatestuversion
b. Implementuaustrongerupasswordupolicy
c. Provideuregularucybersecurityutraininguforuemployees
d. Installuausophisticateduintrusionudetectionusystemu-uCorrectuAnsweru-
uc.uProvideuregularucybersecurityutraininguforuemployees
pg.u2
, Anuattackeruplansutouexploituflawsuinuanuoperatingusystemutougainuaccessutouauuser'sucomputerusystem.uW
hatuisuaupreventionumechanismuforuthisutypeuofuattack?
a. Firewall
b. Patching
c. Antivirus
d. VirtualuPrivateuNetworku(VPN)u-uCorrectuAnsweru-ub.uPatching
Anuunauthorizeduthird-
partyuhasugaineduaccessutouaucompanyunetwork.uHowucanutheyubeupreve
ntedufromudeletingudata?
a. Accessucontrols
b. Physicalucontrols
c. Biometrics
d. Manutrapu-uCorrectuAnsweru-ua.uAccessucontrols
Anuattackeruhasugaineduaccessutoutheupasswordsuofuseveraluemployeesuofuaucompanyuthroughuaubruteuforce
uattack.uWhichuauthenticationumethoduwouldukeeputheuattackerufromuaccessingutheuemployees'udevices?
a. MFAu(multi-factoruauthentication)
b. AAAu(authentication,uauthorization,uanduaccounting)
c. PKIu(publicukeyuinfrastructure)
d. TCP/IPu(transmissionucontroluprotocol/internetuprotocolu-uCorrectuAnsweru-ua.uMFAu(multi-
factoruauthentication)
AfterudownloadinguauCD/DVDuburninguprogram,uauuserunoticesuthatusomeoneuisuremotelyuaccessingutheuco
mputeruduringunighttimeuhours.
WhichutypeuofumalwareuisulikelyufounduinutheuCD/DVDusoftware?
a. Virus
b. Adware
c. Worm
d. Trojanuhorseu-uCorrectuAnsweru-ud.uTrojanuhorse
pg.u3
u u u u u u
–
FOUNDATIONS/ Updated Questions with Correct Answers -
u u u u u u u
Latest 2024.
u
Whichutypeuofuattackuexploitsuanuunpatchedusoftwareuvulnerability?
a. Zero-day
b. Brue-force
c. Diffie-Hellman
d. Man-in-the-middleu-uCorrectuAnsweru-uZero-day
AucompanyuhasutheupolicyuthatuallunewuuserupasswordsuareuP@ssw0rdubutudoesunoturequireunewuusersuto
uchangeutheirupassword.uAnuemployeeurandomlyutriesuaucoworker'suaccountuwithutheunewuuserupasswor
dutouseeuifutheyucanuloguinuasutheucoworker.uWhichutypeuofuvulnerabilityudoesuthisucreate?
a. BYOD
b. Weakupassword
c. Defaultupassword
d. Misconfiguredufirewallurulesu-uCorrectuAnsweru-uDefaultupassword
Anuemployeeuthatudoesunotuwantutoumissuemailsufromuimportantuclientsusetsuupuherucellularusmartphone
utouallowuherutoucheckuemail.uUnfortunately,usheudoesunotuinstalluantivirususoftwareuonutheucellularuphone
.uWhatutypeuofuvulnerabilityuisurepresented?
a. Industryuthreat
b. Misconfiguredu firewallu rules
c. Weakupasswords
d. BYOD/Mobileu-uCorrectuAnsweru-uBYOD/Mobile
Whatuisutheudefinitionuofuvulnerability,uinucomputerusecurity?
a. Ituisuauweaknessuwhichucanubeuexploitedubyuauthreat,usuchuasuanuattacker,utouperformuunauthorize
duactionsuwithinuaucomputerusystem.
,pg.u1
,b. Ituisuaupossibleudangeruthatumightuexploituauweaknessutoubreachusecurityuanduthereforeucause
upossibleuharm.
c. Ituisuanuactionutakenubyuauthreatuthatuexploitsuauweaknessuthatuattemptsutoueitherublockuauthorized
uaccessutouanuassetuorutougainuunauthorizeduaccessutouanuasset.
d. Ituisutheupotentialuofuauthreatutouexploituauweaknessuviauanuattack.u-uCorrectuAnsweru-
uItuisuauweaknessuwhichucanubeuexploitedubyuauthreat,usuchuasuanuattacker,utouperformuunauthorizedu
actionsuwithinuaucomputerusystem.
Whatuisurequiredutouestablishuausecureuconnectionutouauremoteunetworkuoveruanuinsecureulink?
a. VirtualuPrivateuNetworku(VPN)uservice
b. Linux
c. CommanduLineuInterface
d. TORuNetworku-uCorrectuAnsweru-uVirtualuPrivateuNetworku(VPN)uservice
Anuorganizationuisuconcerneduaboutubruteuforceuattacks.uHo
wushouldutheuorganizationucounteruthisurisk?
a. Installuaumantrapuandubiometricuscanneruatutheuentranceuofuitsudataucenter.
b. Implementuausystemuhardeningupolicyuthatuensuresuoperatingusystemuupdatesuandusoftware
upatchesuareuinstalleduregularly.
c. Instituteuaulog-inupolicyuthatulocksuusersuoutuofuanuaccountuafteruthreeufailedupassworduattempts.
d. Initiateurole-baseduaccessutouitsusystemsutoureduceutheupossibilityuofuescalateduprivileges.u-
uCorrectuAnsweru-uc.uInstituteuaulog-
inupolicyuthatulocksuusersuoutuofuanuaccountuafteruthreeufailedupassword
attempts.
Anuorganizationusuffersuausocialuengineeringuattackuthaturesultsuinuaucybercriminalugaininguaccessutouitsunet
worksuandutouitsucustomers'uprivateuinformation.
Howucanutheuorganizationumitigateuthisuriskuinutheufuture?
a. Updateuuseruantivirususoftwareutoutheulatestuversion
b. Implementuaustrongerupasswordupolicy
c. Provideuregularucybersecurityutraininguforuemployees
d. Installuausophisticateduintrusionudetectionusystemu-uCorrectuAnsweru-
uc.uProvideuregularucybersecurityutraininguforuemployees
pg.u2
, Anuattackeruplansutouexploituflawsuinuanuoperatingusystemutougainuaccessutouauuser'sucomputerusystem.uW
hatuisuaupreventionumechanismuforuthisutypeuofuattack?
a. Firewall
b. Patching
c. Antivirus
d. VirtualuPrivateuNetworku(VPN)u-uCorrectuAnsweru-ub.uPatching
Anuunauthorizeduthird-
partyuhasugaineduaccessutouaucompanyunetwork.uHowucanutheyubeupreve
ntedufromudeletingudata?
a. Accessucontrols
b. Physicalucontrols
c. Biometrics
d. Manutrapu-uCorrectuAnsweru-ua.uAccessucontrols
Anuattackeruhasugaineduaccessutoutheupasswordsuofuseveraluemployeesuofuaucompanyuthroughuaubruteuforce
uattack.uWhichuauthenticationumethoduwouldukeeputheuattackerufromuaccessingutheuemployees'udevices?
a. MFAu(multi-factoruauthentication)
b. AAAu(authentication,uauthorization,uanduaccounting)
c. PKIu(publicukeyuinfrastructure)
d. TCP/IPu(transmissionucontroluprotocol/internetuprotocolu-uCorrectuAnsweru-ua.uMFAu(multi-
factoruauthentication)
AfterudownloadinguauCD/DVDuburninguprogram,uauuserunoticesuthatusomeoneuisuremotelyuaccessingutheuco
mputeruduringunighttimeuhours.
WhichutypeuofumalwareuisulikelyufounduinutheuCD/DVDusoftware?
a. Virus
b. Adware
c. Worm
d. Trojanuhorseu-uCorrectuAnsweru-ud.uTrojanuhorse
pg.u3