100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D315 STUDY GUIDE SECTION 2 EXAM QUESTIONS & VERIFIED CORRECT ANSWERS

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
10-11-2025
Written in
2025/2026

WGU D315 STUDY GUIDE SECTION 2 EXAM QUESTIONS & VERIFIED CORRECT ANSWERS designed to help learners prepare for the objective assessment (OA) or performance assessment (PA) tied to D315










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
November 10, 2025
Number of pages
5
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D315 STUDY GUIDE SECTION 2
EXAM QUESTIONS & VERIFIED
CORRECT ANSWERS

SecOps

· Combines IT operations and security to improve an organization's cyber resiliency




Vulnerability

A location in a system most likely to be penetrated or exploited




Zero-day Vulnerability

A vulnerability typically unknown to the vendor and for which no patch or fix is available. The
vendor has 0 days to prepare a patch as the vulnerability is already known and exploited.




Database Control Attack

SQL Injection. Buffer overflow (Similar to SQL Injection, but they enter too much information
into the former, causing the app to crash or other damage).




Spoofing Attack

Man-In-the-Middle, VLAN Hopping (attacking network resources on a VLAN. An attacking host
on a VLAN gains access to traffic on other VLANS that wouldn't normally be accessible)

, Denial of Service Attack

Denying service to a computer, network, or network server by overwhelming the victim with
large amounts of useless traffic. A computer is used to flood a server with TCP and UDP packets.




Ping of Death Attack

Attacker pings the target and sends an ICMP packet over the max of 65,535 bytes and causes
the victim's system to crash or stop functioning. Causes bumper overflow and crashes.




Ping Flood (Starts with Ping Sweep) Attack

Information gathering technique used to identify live hosts by pinging them. After the sweep
the attacker overwhelms the victim's computer with a large amount of ICMP echo-request
packets (pings).




SMURF DD0S (Distributed Attack)

Rather than one computer sending ICMP packets, multiple computers are replying to the ICMP
packet. Spoofs the source address for all ICMP packets.




DEAUTH Attack

Deauthentication, DoS attack where the attacker can force any or all off the network.




Exploit Attack (RPC)
$11.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
STUVIA2024
5.0
(1)

Also available in package deal

Thumbnail
Package deal
package deal for WGU D315 EXAM (LATEST UPDATE)
-
32 2025
$ 519.68 More info

Get to know the seller

Seller avatar
STUVIA2024 Chamberlain College Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
5
Member since
8 months
Number of followers
0
Documents
5443
Last sold
3 days ago

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions