Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

WGU D120 CERTIFICATION SCRIPT 2026 QUESTIONS WITH SOLUTIONS GRADED A+

Puntuación
-
Vendido
-
Páginas
27
Grado
A+
Subido en
29-03-2026
Escrito en
2025/2026

WGU D120 CERTIFICATION SCRIPT 2026 QUESTIONS WITH SOLUTIONS GRADED A+

Institución
WGU D120
Grado
WGU D120

Vista previa del contenido

WGU D120 CERTIFICATION SCRIPT 2026
QUESTIONS WITH SOLUTIONS GRADED A+

◍ nmap.
Answer: A well-known port scanner that can also search for hosts on a
network, identify the operating systems those hosts are running, detect the
version of the services running on any open ports, and more
◍ Confidentiality.
Answer: the act of holding information in confidence, not to be released to
unauthorized individuals-a necessary component of privacy
◍ SDL Regex Fuzzer.
Answer: A tool developed by Microsoft for testing certain pattern-matching
expressions for potential vulnerabilities
◍ kismet.
Answer: a well-known Linux sniffing tool used to detect wireless access
points
◍ network segmentation.
Answer: The act of dividing a network into multiple smaller networks, each
acting as its own small network (subnet)
◍ flash media.
Answer: storage media that is least sensitive to temperature, humidity,
magnetic fields, and impacts
◍ packet filtering.
Answer: A firewall technology that inspects the contents of each packet in
network traffic individually and makes a gross determination (based on
source and destination IP address, port number, and the protocol being used)
of whether the traffic should be allowed to pass

,◍ BinScope Binary Analyzer.
Answer: A tool developed by Microsoft to examine source code for general
good practices
◍ SATE (Security Awareness, Training and Education).
Answer: a program that seeks to make users aware of the risk they are
accepting through their current actions and attempts to change their behavior
through targeted efforts
◍ client-side attack.
Answer: A type of attack that takes advantage of weaknesses in the software
loaded on client machines or one that uses social engineering techniques to
trick us into going along with the attack
◍ denying access.
Answer: an act that prevents a party from accessing something, such as
logging on to a machine or entering the lobby of our building after hours
◍ use of personal equipment.
Answer: security awareness issue that is concerned with protecting a
company's assets
◍ preparation phase.
Answer: The risk management phase that consists of all of the activities that
we can perform in advance of the incident itself, in order to better enable us
to handle it
◍ CA (certificate authority).
Answer: a trusted entity that handles digital certificates
◍ residual data.
Answer: Data that is unintentionally left behind on a storage device
◍ data in use.
Answer: This type of data is the hardest to protect
◍ Safety, evacuation plans, administrative controls.
Answer: Name the 3 main considerations for protecting people

, ◍ data in motion.
Answer: This type of data is best protected by protecting the data itself
(using SSL, TLS) and protecting the connection (using IPsec VPN, SSL
VPN)
◍ post-incident activity phase.
Answer: The risk management phase where we determine specifically what
happened, why it happened, and what we can do to keep it from happening
again
◍ availability, residual data, backups.
Answer: Name the 3 main considerations for protecting data
◍ administrative controls.
Answer: based on rules, laws, policies, procedures, guidelines, and other
items that are "paper" in nature
◍ eradication.
Answer: to completely remove the effects of the issue from our environment
◍ firewall.
Answer: a mechanism for maintaining control over the traffic that flows into
and out of our networks
◍ 6 main hardening categories.
Answer: 1. Removing unnecessary software2. Removing or turning off
unessential services3. Making alterations to common accounts4. Applying
the principle of least privilege5. Applying software updates in a timely
manner6. Making use of logging and auditing functions
◍ Sun Tzu.
Answer: A Chinese military general from 6th century BC who wrote The
Art of War, a text that shows early examples of operations security
principles
◍ modification attack.
Answer: An attack that involves tampering with our assets-primarily affects

Escuela, estudio y materia

Institución
WGU D120
Grado
WGU D120

Información del documento

Subido en
29 de marzo de 2026
Número de páginas
27
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$13.99
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor
Seller avatar
ProfessorBeatrice

Conoce al vendedor

Seller avatar
ProfessorBeatrice Havard School
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
-
Miembro desde
2 semanas
Número de seguidores
0
Documentos
1849
Última venta
-
Professor_Beatrice7

I believe learning isn’t just about cramming it’s about clarity, growth, and building the confidence to conquer any challenge. That’s why you’ll find a handpicked collection of top notch, easy to digest study materials, smart summaries, and guides tailored to a wide range of subjects and learning styles. Whether you're gearing up for exams, brushing up on class notes, or just need that extra push, I have you covered. From quick-reference sheets to deep-dive notes, there’s something here for every learner. Think of this place as a place where productivity meets peace of mind. So settle in and let’s sharpen your focus and fuel your success, one file at a time. Thanks for making me your study partner. Let’s unlock your full potential together!

Lee mas Leer menos
0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes