100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D482 PERFOMANCE ASSESSMENT (Secure Network Design - D482) 2025 latest !!questions and answers

Rating
-
Sold
-
Pages
23
Grade
A+
Uploaded on
19-05-2025
Written in
2024/2025

WGU D482 PERFOMANCE ASSESSMENT (Secure Network Design - D482) 2025 latest !!questions and answers

Institution
WGU D482
Course
WGU D482










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D482
Course
WGU D482

Document information

Uploaded on
May 19, 2025
Number of pages
23
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D482 PERFOMANCE ASSESSMENT
(Secure Network Design - D482) 2025
latest !!questions and answers

A laptop has been stolen, and the data has been seen for sale on the darknet.
|| || || || || || || || || || || || || || ||



Which process could have protected the confidentiality of the data? -
|| || || || || || || || || || ||




CORRECT ANSWERS ✔✔Hard Drive Encryption
|| || || || ||




Classify each attack method in relation to its direct impact on the CIA triad. -
|| || || || || || || || || || || || || ||




CORRECT ANSWERS ✔✔Key Logger: Confidentiality
|| || || || ||




DNS Poisoning: Integrity
|| ||




Covert Channels: Confidentiality
|| ||




DDoS: Availability
||




A security administrator has configured a small keysize to protect the VPN.
|| || || || || || || || || || ||




Which security objective does this affect? - CORRECT ANSWERS
|| || || || || || || ||




✔✔Confidentiality
||




A laptop has been stolen, and the data has been seen for sale on the darknet.
|| || || || || || || || || || || || || || ||




Which process could have protected the confidentiality of the data? -
|| || || || || || || || || ||




CORRECT ANSWERS ✔✔Hard Drive encryption
|| || || || ||

,When browsing to a financial website, a user receives an error on the browser
|| || || || || || || || || || || || ||



that points to the certificate
|| || || || ||




on the website. The user reviews the certificate and maps it to a known
|| || || || || || || || || || || || ||



certificate authority.
|| ||




Why did the user need to perform these actions? - CORRECT ANSWERS ✔✔To
|| || || || || || || || || || || ||



establish a trust relationship
|| || || ||




A team of scientists is working on a secure project. The network
|| || || || || || || || || || ||



administrator needs to configure a
|| || || || ||




network for the team that is not routable from the Internet. A firewall is
|| || || || || || || || || || || || ||



protecting the scientists' network
|| || || ||




and is using network address translation (NAT) to translate the internal IP
|| || || || || || || || || || ||



addresses to public IP
|| || || ||




addresses.
Which IP address should the network administrator configure on the inside
|| || || || || || || || || ||




interface of the firewall? - CORRECT ANSWERS ✔✔10.14.15.16
|| || || || || || || ||




An ad hoc network design team has just finished a presentation on the latest
|| || || || || || || || || || || || ||



updates to the organization's
|| || || ||




network infrastructure. The team ensured that plenty of redundancy has been
|| || || || || || || || || ||



built in and bottlenecks
|| || || ||




have been eliminated. || ||




Which security objective has the team bolstered through these
|| || || || || || || ||




improvements? - CORRECT ANSWERS ✔✔Availability
|| || || || ||




A company has recently implemented a new email encryption system that
|| || || || || || || || || ||



uses public key infrastructure
|| || || ||

, (PKI). The company is now requiring all employees to sign and encrypt
|| || || || || || || || || || ||



internal communication. An
|| || ||




employee wants to send a digitally signed message to the IT director. || || || || || || || || || || ||




What does the IT director use to decode the employee's signature under the
|| || || || || || || || || || || ||




new system? - CORRECT ANSWERS ✔✔The employee's public key
|| || || || || || || || ||




An administrator at a small office is tasked with supporting a new time clock
|| || || || || || || || || || || || ||



that has been installed on the
|| || || || || ||




network. The outsourced company managing the time clock states that the
|| || || || || || || || || ||



connection protocol it uses
|| || || ||




with the clock is encrypted, but it needs to allow incoming connections from
|| || || || || || || || || || || ||



the Internet.
|| ||




Which action should allow the outsourced company to securely manage the
|| || || || || || || || || ||



time clock with a minimal
|| || || || ||




amount of configuration effort? - CORRECT ANSWERS ✔✔Setting up a port
|| || || || || || || || || ||



forward on the firewall from the outsourced company to the
|| || || || || || || || || ||




time clock ||




A small nonprofit company has received several legacy wireless access points
|| || || || || || || || || ||



(APs) as a donation. The
|| || || || ||




security administrator discovers that the encryption protocol the devices use
|| || || || || || || || ||



is not very secure. The encryption key can be discovered by a malicious
|| || || || || || || || || || || || ||



hacker in only a few minutes. After discussions with other
|| || || || || || || || || ||




security professionals, the administrator learns the APs can implement a key
|| || || || || || || || || ||



protocol that can change the
|| || || || ||




encryption key every few seconds and provide a per-packet verification at || || || || || || || || || ||



each side of the
|| || || ||

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EXAMSTUDYPLUG Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
311
Member since
3 year
Number of followers
107
Documents
18508
Last sold
2 days ago
GRADE BUDDY

Welcome to My Page! Are you looking for high-quality study resources to ace your exams or better understand your coursework? You've come to the right place! I'm passionate about sharing my knowledge and helping students succeed academically. Here, you'll find a wide range of well-organized notes, study guides, and helpful materials across various subjects, including Maths ,nursig, Biology, History, etc.. Each resource is carefully crafted with detailed explanations, clear examples, and relevant key points to help simplify complex concepts. Whether you're preparing for a test, reviewing lectures, or need extra support, my resources are designed to make your learning experience smoother and more effective. Let me be a part of your academic journey, and feel free to reach out if you have any questions or need personalized assistance!

Read more Read less
4.5

230 reviews

5
155
4
50
3
13
2
5
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions