WGU D315 |OA| OBJECTIVE ASSESSMENT| NETWORK
AND SECURITY – FOUNDATIONS| EXAM
Correct
Incorrect
does a NIC card assigned on the OSI model?
3
4
, Don't know?
2 of 293
Term
A network admin is configuring an application and needs to be sure
that port 4432 is open what tool should the admin use?
Give this one a try later!
nessus nmap
netstat ping
Don't know?
3 of 293
Term
What is packet filtering? How does it work?
Give this one a try later!
Eavesdrop on the traffic sent
Encryption
through the Switch
, Filters using Layer 3 and 4 Using two methods of
protocols authentication
Don't know?
4 of 293
Term
blue team
Give this one a try later!
occurs transport
defends both attacks and defends
Don't know?
5 of 293
Definition
Monitors the network to detect threats. Listens passively
on the network. Alerts network admin of any detected
suspicious behavior.
Give this one a try later!
, IDS (Intrusion Detection
Router
System)
Port Scanner IPS (Intrusion Prevention System)
Don't know?
6 of 293
Definition
rely on two different keys to encrypt and decrypt the
traffic. This is particularly useful on the internet where
the encryption of the data being sent to and from e-
commerce and banking websites is needed.
Give this one a try later!
Symmetric Key Encryption Secret Key Encryption
Full Disk Encryption Asymmetric Key Encryption
Don't know?
7 of 293
Definition
Receives the segments and transmits them across the network as
packets. As you are accessing the website, this Layer adds the
AND SECURITY – FOUNDATIONS| EXAM
Correct
Incorrect
does a NIC card assigned on the OSI model?
3
4
, Don't know?
2 of 293
Term
A network admin is configuring an application and needs to be sure
that port 4432 is open what tool should the admin use?
Give this one a try later!
nessus nmap
netstat ping
Don't know?
3 of 293
Term
What is packet filtering? How does it work?
Give this one a try later!
Eavesdrop on the traffic sent
Encryption
through the Switch
, Filters using Layer 3 and 4 Using two methods of
protocols authentication
Don't know?
4 of 293
Term
blue team
Give this one a try later!
occurs transport
defends both attacks and defends
Don't know?
5 of 293
Definition
Monitors the network to detect threats. Listens passively
on the network. Alerts network admin of any detected
suspicious behavior.
Give this one a try later!
, IDS (Intrusion Detection
Router
System)
Port Scanner IPS (Intrusion Prevention System)
Don't know?
6 of 293
Definition
rely on two different keys to encrypt and decrypt the
traffic. This is particularly useful on the internet where
the encryption of the data being sent to and from e-
commerce and banking websites is needed.
Give this one a try later!
Symmetric Key Encryption Secret Key Encryption
Full Disk Encryption Asymmetric Key Encryption
Don't know?
7 of 293
Definition
Receives the segments and transmits them across the network as
packets. As you are accessing the website, this Layer adds the