100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU D315 - PRE-ASSESSMENT: NETWORK AND SECURITY - FOUNDATIONS

Puntuación
-
Vendido
-
Páginas
58
Grado
A+
Subido en
13-11-2024
Escrito en
2024/2025

WGU D315 - PRE-ASSESSMENT: NETWORK AND SECURITY - FOUNDATIONS .A ______ is a device that connects two or more packet-switched networks or subnetworks. It serves two primary functions: managing traffic between these networks by forwarding data packets to their intended IP addresses, and allowing multiple devices to use the same internet connection. - ANSWER-Router .A _______ attack send TCP/IP traffic to each and every port to learn which services are running. Spoofing Port scanning Ping flood SQL Injection - ANSWER-Port Scanning .A bridge _________________________________________________ a. connects wireless devices to the network using AES b. connects storage systems using IP based connections c. connects two networks by forwarding traffic without analysis for which host receives the data d. provides a direct connection to devices on the same network - ANSWER-c. connects two networks by forwarding traffic without analysis for which host receives the data .A company has the policy that all new user passwords are P@ssw0rd but does not require new users to change their password. An employee randomly tries a coworker's account with the new user password to see if they can log in as the coworker. Which type of vulnerability does this create? a. BYOD b. Weak password c. Default password d. Misconfigured firewall rules - ANSWER-Default password .A company is concerned with traffic that flows through the network. There is a concern that there may be malware that exists that is not being blocked or eradicated by antivirus. What technology can be put in place to detect potential malware traffic on the network? IDS firewall Honeypot NAC - ANSWER-IDS .A company needs to secure the network using a security system that can inspect the network traffic's payload to prevent attacks. What type of firewall would you recommend? Application Firewall Stateful Firewall Packet Filtering Layer 3 or 4 Firewall - ANSWER-Application Firewall .A company provides access to employees' tax and personal information via a public-facing web portal. What should the company implement to encrypt employees' web access to this information? a. Transport layer security (TLS) b. Network intrusion detection system (NIDS) c. Advanced encryption standard (AES) d. Two-factor authentication (2FA) - ANSWER-a. Transport layer security (TLS) .A cybersecurity specialist is asked to identify the potential criminals known to attack the organization. Which type of hackers would the cybersecurity specialist be least concerned with? Gray hat hackers Black hat hackers Script kiddies White hat hackers - ANSWER-White hat hackers .A hub is the device of choice to decrease traffic on a network segment. True False - ANSWER-False .A malicious user was able to lock a user's account after guessing the user's password multiple times unsuccessfully. Which category of the CIA triad did the malicious user target in this attack? a. Confidentiality b. Integrity c. Availability d. Accessibility - ANSWER-c. Availability .A malicious user was able to perform a password brute force attack on a human resource email account and is now reading through all their emails. Which category of the CIA triad was compromised? Authentication Confidentiality Availability Integrity - ANSWER-Confidentiality .A network admin is configuring an application and needs to be sure that port 4432 is open what tool should the admin use? Ping netstat nmap TCP_Function - ANSWER-nmap (Network Mapper) It is an open-source Linux command-line tool that is used to scan IP addresses and ports in a network and to detect installed applications. .A router is a Layer 3 device. True False - ANSWER-True .A stateful firewall uses Stateful Packet Inspection to protect the network. How does this type of firewall operate? a. A stateful firewall uses a list to allow connections b. A stateful firewall makes requests on behalf of other systems on a Network c. A stateful firewall that compares all inbound traffic to ensure there is an outbound request. d. A stateful firewall that compares IP addresses to a block list to deny connections - ANSWER-c. A stateful firewall that compares all inbound traffic to ensure there is an outbound request. .A switch forwards data only to the port that are connected to the destination device. It knows which port to forward it to based on which value?* Conf value IP address Port Number MAC Address - ANSWER-MAC Address .A switch is a Layer 1 device and unlike a hub it creates a direct connection to devices on the network. True False - ANSWER-False .A third world country has solicited the services of several hackers to perform an attack on the U.S. treasury department? Which time of attack would this be classified as? Nation State Espionage Industrial Espionage International Espionage World Espionage - ANSWER-Nation State Espionage .A user is mistakenly granted access to customer accounts not required for his duties. Which component of the AAA model is violated? a. Authentication b. Authorization c. Availability d. Access - ANSWER-b. Authorization

Mostrar más Leer menos
Institución
WGU D315 - PRE-ASSESSMENT
Grado
WGU D315 - PRE-ASSESSMENT











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU D315 - PRE-ASSESSMENT
Grado
WGU D315 - PRE-ASSESSMENT

Información del documento

Subido en
13 de noviembre de 2024
Número de páginas
58
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU D315 - PRE-ASSESSMENT: NETWORK AND
SECURITY - FOUNDATIONS
.A ______ is a device that connects two or more packet-switched networks or subnetworks. It serves two
primary functions: managing traffic between these networks by forwarding data packets to their intended IP
addresses, and allowing multiple devices to use the same internet connection. - ANSWER-Router



.A _______ attack send TCP/IP traffic to each and every port to learn which services are running.



Spoofing

Port scanning

Ping flood

SQL Injection - ANSWER-Port Scanning



.A bridge _________________________________________________

a. connects wireless devices to the network using AES

b. connects storage systems using IP based connections

c. connects two networks by forwarding traffic without analysis for which host receives the data

d. provides a direct connection to devices on the same network - ANSWER-c. connects two networks by
forwarding traffic without analysis for which host receives the data



.A company has the policy that all new user passwords are P@ssw0rd but does not require new users to
change their password. An employee randomly tries a coworker's account with the new user password to see if
they can log in as the coworker. Which type of vulnerability does this create?



a. BYOD

b. Weak password

c. Default password

,d. Misconfigured firewall rules - ANSWER-Default password



.A company is concerned with traffic that flows through the network. There is a concern that there may be
malware that exists that is not being blocked or eradicated by antivirus. What technology can be put in place to
detect potential malware traffic on the network?



IDS

firewall

Honeypot

NAC - ANSWER-IDS



.A company needs to secure the network using a security system that can inspect the network traffic's payload
to prevent attacks. What type of firewall would you recommend?



Application Firewall

Stateful Firewall

Packet Filtering

Layer 3 or 4 Firewall - ANSWER-Application Firewall



.A company provides access to employees' tax and personal information via a public-facing web portal. What
should the company implement to encrypt employees' web access to this information?



a. Transport layer security (TLS)

b. Network intrusion detection system (NIDS)

c. Advanced encryption standard (AES)

d. Two-factor authentication (2FA) - ANSWER-a. Transport layer security (TLS)



.A cybersecurity specialist is asked to identify the potential criminals known to attack the organization. Which
type of hackers would the cybersecurity specialist be least concerned with?

,Gray hat hackers

Black hat hackers

Script kiddies

White hat hackers - ANSWER-White hat hackers



.A hub is the device of choice to decrease traffic on a network segment.



True

False - ANSWER-False



.A malicious user was able to lock a user's account after guessing the user's password multiple times
unsuccessfully.

Which category of the CIA triad did the malicious user target in this attack?



a. Confidentiality

b. Integrity

c. Availability

d. Accessibility - ANSWER-c. Availability



.A malicious user was able to perform a password brute force attack on a human resource email account and is
now reading through all their emails. Which category of the CIA triad was compromised?



Authentication

Confidentiality

Availability

Integrity - ANSWER-Confidentiality

, .A network admin is configuring an application and needs to be sure that port 4432 is open what tool should
the admin use?



Ping

netstat

nmap

TCP_Function - ANSWER-nmap (Network Mapper)



It is an open-source Linux command-line tool that is used to scan IP addresses and ports in a network and to
detect installed applications.



.A router is a Layer 3 device.



True

False - ANSWER-True



.A stateful firewall uses Stateful Packet Inspection to protect the network. How does this type of firewall
operate?



a. A stateful firewall uses a list to allow connections

b. A stateful firewall makes requests on behalf of other systems on a Network

c. A stateful firewall that compares all inbound traffic to ensure there is an outbound request.

d. A stateful firewall that compares IP addresses to a block list to deny connections - ANSWER-c. A stateful
firewall that compares all inbound traffic to ensure there is an outbound request.



.A switch forwards data only to the port that are connected to the destination device. It knows which port to
forward it to based on which value?*
$24.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
BESTPRICE

Conoce al vendedor

Seller avatar
BESTPRICE EXAMS
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
0
Miembro desde
1 año
Número de seguidores
0
Documentos
36
Última venta
-
BESTPRICE

Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers. We specialize on NURSING,WGU,ACLS USMLE,TNCC,PMHNP,ATI and other major courses, Updated Exam, Study Guides and Test banks. If you don't find any document you are looking for in this store contact us and we will fetch it for you in minutes, we love impressing our clients with our quality work and we are very punctual on deadlines. Please go through the sets description appropriately before any purchase and leave a review after purchasing so as to make sure our customers are 100% satisfied. I WISH YOU SUCCESS IN YOUR EDUCATION JOURNEY

Lee mas Leer menos
0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes