100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D315 Network and Security foundations Study Set| Questions & Answers 2025

Rating
-
Sold
-
Pages
15
Grade
A+
Uploaded on
12-04-2025
Written in
2024/2025

3DES (Triple Data Encryption Standard) - Symmetric encryption algorithm that uses the now antiquated DES algorithm 3 times in a row to encrypt your data. A server administrator is tasked to harden the database servers, and one of the requirements is to document any firewall ports that are open and closed. Which native Windows command line utility should the administrator use? finger, tcpdump, dig, netstat - netstat AD-hoc mode - all wireless communication is performed in a peer-to-peer fashion and does not require or involve a WAP. Rare in home networks or offices but can be helpful by connecting a printer or such directly. AD-hoc is like connecting a physical cable and is uses in file transfer between devices like a GoPro and laptop. Advanced Encryption Standard (AES) - Symmetric key algorithm. can be used with 128-bit, 192-bit, or 256-bit key. longer key lengths are exponentially harder to crack, but also require a higher amount of computing power to encryp

Show more Read less
Institution
WGO C779
Course
WGO C779









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGO C779
Course
WGO C779

Document information

Uploaded on
April 12, 2025
Number of pages
15
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D315 Network and Security foundations Study Set|
Questions & Answers 2025
3DES (Triple Data Encryption Standard) - ✔✔✔Symmetric encryption algorithm that uses the now
antiquated DES algorithm 3 times in a row to encrypt your data.



A server administrator is tasked to harden the database servers, and one of the requirements is to
document any firewall ports that are open and closed. Which native Windows command line utility
should the administrator use? finger, tcpdump, dig, netstat - ✔✔✔netstat



AD-hoc mode - ✔✔✔all wireless communication is performed in a peer-to-peer fashion and does not
require or involve a WAP. Rare in home networks or offices but can be helpful by connecting a printer or
such directly. AD-hoc is like connecting a physical cable and is uses in file transfer between devices like a
GoPro and laptop.



Advanced Encryption Standard (AES) - ✔✔✔Symmetric key algorithm. can be used with 128-bit, 192-bit,
or 256-bit key. longer key lengths are exponentially harder to crack, but also require a higher amount of
computing power to encrypt. Today most devices and websites use 256-bit.



An organization needs to perform an analysis to identify vulnerabilities such as open firewall ports,
unauthorized operating systems or device types, and weak passwords. Which tool is recommended?
nslookup, nmap, tracepath, finger - ✔✔✔nmap



Application Level Firewall - ✔✔✔To combat potential weakness in security, network admins began using
proxy servers that could act as a middleman, reading and parsing the traffic payload, and then
forwarding it on to the intended destination if the payload was safe. Layer-7 firewalls.



APT (Advanced persistent Threat) - ✔✔✔a virus that is injected and sits dormant until a preordained
time or trigger from an outside source, at which point it releases its attack. The virus/malware remains
undetected while it sits for long periods, perhaps even months, just waiting for the right time. Sits long
enough at also effect backup restores, so you must comply with the attacker or everything's gone.



ARP (Address Resolution Protocol) - ✔✔✔displays the IP to physical (MAC) address mappings for hosts
that have been discovered in the ARP cache. ARP can be used to add, remove, or modify entries in the
ARP cache.

, Asset - ✔✔✔A person, device, location, or information that SecOps (security operations) aims to protect
from an attack.



Asymmetric Key encryption - ✔✔✔relies on two different keys to encrypt and decrypt traffic. This is
particularly useful on the internet where the encryption of the data being sent to and from e-commerce
and banking websites is needed.



Attack - ✔✔✔An action taken by a threat that exploits a vulnerability that attempts to either block
authorized access to an asset, or to gain unauthorized access to an asset.



Authentication, Authorization and Accounting (AAA) - ✔✔✔describes the process of granting or denying
access to data and network resources as well as verifying that the security that the security controls are
working properly. Authentication-they are who they say; Authorization-what they should have access to;
Accounting-account for and report on the access that a user was granted and how often they access it.



Black Hat Hackers - ✔✔✔may or may not be an IT professional but possess the knowledge and will
breach systems for profit. They do not ask permission and are not interested in helping their targets
improve security.



Blue, Red, White, and Purple teams - ✔✔✔Red tried to compromise the security and Blue tries to
defend. White observes and acts as a Ref. Purple is when blue and red join to train each other and make
improvements to the system.



Bridge - ✔✔✔Similarly to a router, it connects two or more networks. The difference is that a router
analyzes data packets to determine where to send the packet next, while a bridge simply forwards the
data to the next network without analysis.



Buffer overflow - ✔✔✔attacker purposefully enters text that is too large to fit within a region of
memory called a buffer. The overflow often overwrites neighboring, potentially executable areas of
memory. The buffer is code with instruction that grant the hacker control of the server.
R213,88
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
RISEPREP

Get to know the seller

Seller avatar
RISEPREP Oxford University
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
1 year
Number of followers
1
Documents
354
Last sold
1 month ago
Get Quality of Document

Hello I'm a passionate and experienced online tutor. I offer support to help students succeed. you can access study materials, notes, and guides to help you excel academically I am hear to help you. review so as to know the quality of service offered & to better improve your expirience. thank you and welcome back. BONUS! BONUS! BONUS! For every student you refer to me with an order that is completed and paid transparently, I will give you one free study document you need or do one assignment for you, free of charge!Thank you Very much for the purchase Kindly leave a Review to help know the Quality of Document and those who have reviewed thanks again

Read more Read less
0,0

0 reviews

5
0
4
0
3
0
2
0
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions