100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

GU D315 - NETWORK AND SECURITY – FOUNDATIONS STUDY GUIDE QUESTIONS WITH ACCURATE CONPLETE SOLUTIONS | GRADED A+ | SURE TO PASS – JUST RELEASED

Rating
-
Sold
-
Pages
96
Grade
A+
Uploaded on
30-07-2025
Written in
2024/2025

GU D315 - NETWORK AND SECURITY – FOUNDATIONS STUDY GUIDE QUESTIONS WITH ACCURATE CONPLETE SOLUTIONS | GRADED A+ | SURE TO PASS – JUST RELEASED 1. An office's infrastructure connects network devices and printers through a central access point without the use of cabling. Which network type does this office use? a. WLAN b. WAN c. CAN d. SAN - ANSWER WLAN 2. Which type of attack send emails claiming to be your bank and asking you to verify that your username and password are correct? Dictionary attack Phishing Brute force attack Man-in-the-middle - ANSWER Phishing 3. Who uses Nessus software to san servers and network devices for known vulnerabilities. Script Kiddies Insider threats Vulnerability testers Black hat hackers - ANSWER Vulnerability testers 4. Which attack allows an attacker to take control of a database by inserting special commands into input boxes instead the intended data? - ANSWER SQL Injection 5. What type of attack is it when the attacker discovers a software vulnerability that does not have a patch? - ANSWER Zero-day

Show more Read less
Institution
WGU D315
Course
WGU D315











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D315
Course
WGU D315

Document information

Uploaded on
July 30, 2025
Number of pages
96
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

GU D315 - NETWORK AND SECURITY
– FOUNDATIONS STUDY GUIDE
QUESTIONS WITH ACCURATE
CONPLETE SOLUTIONS | GRADED
A+ | SURE TO PASS – JUST
RELEASED


1. An office's infrastructure connects network devices and
printers through a central access point without the use
of cabling. Which network type does this office use?


a. WLAN
b. WAN
c. CAN
d. SAN - ANSWER ✓ WLAN


2. Which type of attack send emails claiming to be your
bank and asking you to verify that your username and
password are correct?

, Dictionary attack
Phishing
Brute force attack
Man-in-the-middle - ANSWER ✓ Phishing


3. Who uses Nessus software to san servers and network
devices for known vulnerabilities.


Script Kiddies
Insider threats
Vulnerability testers
Black hat hackers - ANSWER ✓ Vulnerability testers


4. Which attack allows an attacker to take control of a
database by inserting special commands into input
boxes instead the intended data? - ANSWER ✓ SQL
Injection


5. What type of attack is it when the attacker discovers a
software vulnerability that does not have a patch? -
ANSWER ✓ Zero-day

,6. What phrase represents Authentication best?


7. Do you do what you say you will do?
Are you credentialed for the level of access you need?
Did you arrive at the time you said you did?
Are you who you say you are? - ANSWER ✓ Are you
who you say you are?


8. ARP Poisoning allows an attacker to:


Eavesdrop on the traffic sent through the Hub
Eavesdrop on the traffic sent through the Switch
Eavesdrop on the traffic sent through the Router
Eavesdrop on the traffic sent through the Firewall -
ANSWER ✓ Eavesdrop on the traffic sent through the
Switch


9. What does AAA stand for?


Authorization, Access and Accounting
Authentication, Access and Autoscaling
Authentication, Authorization and Accounting

, Access, Authorization and Authentication - ANSWER
✓ Authentication, Authorization and Accounting


10. What is the best choice that describes the difference
between IDS and IPS?


a. IPS can only detect intrusions and IDS can detect
and stop malicious network attacks.
b. IDS can detect intrusions and IDS can stop
malicious network attacks.
c. IDS is only used for webservers; IPS can be used
in all environments
d. IDS can detect intrusions; IPS can stop malicious
network attacks. - ANSWER ✓ d. IDS can detect
intrusions; IPS can stop malicious network
attacks.


11. What are two types of encryption?


a. Symmetric encryption, the same key encrypts
and decrypts data; asymmetric encryption
different keys encrypt and decrypt data
$14.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
QuizWhiz

Get to know the seller

Seller avatar
QuizWhiz Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
3
Member since
1 year
Number of followers
1
Documents
473
Last sold
3 months ago
Ultimate Q&A Hub | Verified Answers for Success

Welcome to Ultimate Q&A Hub | Verified Answers for Success – your go-to source for high-quality, well-structured Q&A study materials! Whether you're preparing for exams, quizzes, or assignments, my carefully curated question-and-answer documents will help you grasp key concepts quickly and effectively. All resources are clear, accurate, and designed to help you study smarter, not harder. Browse now and start acing your subjects with confidence! For every student you refer to me with an order that is completed and paid transparently, I will do one assignment for you, FREE of any fee.

Read more Read less
0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions