WGU D315 Network and Security Foundation 2024/2
g g g g g g
025 Objective Assessment Verified Questions and A
g g g g g g
nswers 100% Graded A+
g g g
IngwhichgphysicalgLANgtopologygaregnodesgconnectedgtogeachgothergwithgagbackbonegca
blegthatgloopsgaroundgandgendsgatgthegsamegpointgitgstarted?
a. Ring
b. Bus
c. Star
d. Treeg-gRing
WhichgOSIglayergensuresgerror-freegpackets?
a. Application
b. Transport
c. Session
d. Presentationg-gTransport
Whichgtopologygusesgagswitchgorghubgtogconnectgtogallgdevicesgingthegsamegnetwork?
a. Mesh
b. Ring
c. Star
d. Busg-gStar
Whichgcloudgservicegprovidesghardware,goperatinggsystems,gandgwebgserversgbutgn
otgend-usergapplications?
a. IaaS
b. PaaS
c. SaaS
d. RaaSg-gPaaS
Whichgcloudgmodelgprovidesgangexclusivegcloudgcomputinggservicegenvironmentgthatgisgsha
redgbetweengtwogorgmoregorganizations?
a. Public
b. Private
c. Community
d. Hybridg-gCommunity
,Whichgtypegofgsoftwaregisgusedgtogprovidegvirtualization?
a. Database
b. Hypervisor
c. Antivirus
d. Spreadsheetg-gHypervisor
Agusergthatgdoesgnotgwantgtogbegidentifiedgwhilegcommunicatinggongagnetworkgusesganga
pplicationgtogaltergthegcomputer'sgidentity.gWhichgtypegofgexploitgisgbeinggperpetrated?
a. Denial-of-service
b. ARPgpoisoning
c. Smurfgattack
d. Spoofingg-gSpoofing
Angattackergattemptsgtogmisdirectgtrafficgongagnetworkgbackgtogthegattackergbygcorrupting
gthegnetworkgcomputer'sgcachegofgIPgaddressgtogMACgaddressgmappingsgthatgaregcache
d.gWhichgexploitgisgthegattackergperpetrating?
a. Portgscanning
b. Wiretapping
c. Denial-of-service
d. ARPgpoisoningg-gARPgpoisoning
Whichgexploitgactuallygbreachesgthegphysicalgmediumgorgusesgdevicesgtogmonitorgsignal
sgfromgoutsidegthegphysicalgmediumgitself?
a. Spoofing
b. Wiretapping
c. Sniffing
d. Portgscanningg-gWiretapping
Whichgtypegofgattackgcangoverwhelmgagwebgservergbyginsertinggmoregdatagintogagwebgf
ormgthangthegsystemgwasgconfiguredgtoghold?
a. Buffergoverflow
b. ARPgpoisoning
c. Sessionghijacking
d. Cross-sitegscriptingg-gBuffergoverflow
Whichgtypegofgattackgsendsgangemailgclaiminggtogbegfromgagreputablegbusinessgingorder
gtogenticegthegrecipientgtogprovidegsensitiveginformation?
a. Denial-of-service
b. Phishing
c. Passwordgattacks
,d. Man-in-the-middleg-gPhishing
Agusergongagnetworkgisgplanninggtoglaunchgangexploitgagainstgagcoworkergingagneighboringgd
epartment.gThegusergneedsgtogidentifygthegIPgaddressgofgagcoworkergingthegdesiredgdepartm
ent.gWhichgtoolgorgutilitygwillgallowgthegusergtogwatchgnetworkgtrafficgingrealgtimegtogidentifyga
gtarget?
a. Portgscan
b. Antivirusgsoftware
c. Sniffer
d. Portgredirectiong-gSniffer
Whichggroupgofgattackersgisgtypicallygusedgforgpenetrationgtesting?
a. RedgTeam
b. BluegTeam
c. WhitegTeam
d. GraygTeamg-gRedgTeam
Whichgtypegofgattackgexploitsgangunpatchedgsoftwaregvulnerability?
a. Zero-day
b. Brue-force
c. Diffie-Hellman
d. Man-in-the-middleg-gZero-day
AgcompanyghasgthegpolicygthatgallgnewgusergpasswordsgaregP@ssw0rdgbutgdoesgnotgr
equiregnewgusersgtogchangegtheirgpassword.gAngemployeegrandomlygtriesgagcoworker's
gaccountgwithgthegnewgusergpasswordgtogseegifgtheygcangloggingasgthegcoworker.gWhich
gtypegofgvulnerabilitygdoesgthisgcreate?
a. BYOD
b. Weakgpassword
c. Defaultgpassword
d. Misconfiguredgfirewallgrulesg-gDefaultgpassword
Angemployeegthatgdoesgnotgwantgtogmissgemailsgfromgimportantgclientsgsetsgupgherg
cellulargsmartphonegtogallowghergtogcheckgemail.gUnfortunately,gshegdoesgnotginstallg
antivirusgsoftwaregongthegcellulargphone.gWhatgtypegofgvulnerabilitygisgrepresented?
a. Industrygthreat
b. Misconfiguredgfirewallgrules
c. Weakgpasswords
d. BYOD/Mobileg-gBYOD/Mobile
Whatgisgthegdefinitiongofgvulnerability,gingcomputergsecurity?
, a. Itgisgagweaknessgwhichgcangbegexploitedgbygagthreat,gsuchgasgangattacker,gtogperfor
mgunauthorizedgactionsgwithingagcomputergsystem.
b. Itgisgagpossiblegdangergthatgmightgexploitgagweaknessgtogbreachgsecuritygandgtherefor
egcausegpossiblegharm.
c. Itgisgangactiongtakengbygagthreatgthatgexploitsgagweaknessgthatgattemptsgtogeithergblo
ckgauthorizedgaccessgtogangassetgorgtoggaingunauthorizedgaccessgtogangasset.
d. Itgisgthegpotentialgofgagthreatgtogexploitgagweaknessgviagangattack.g-
gItgisgagweaknessgwhichgcangbegexploitedgbygagthreat,gsuchgasgangattacker,gtogperformgu
nauthorizedgactionsgwithingagcomputergsystem.
Whatgisgrequiredgtogestablishgagsecuregconnectiongtogagremotegnetworkgoverganginsecur
eglink?
a. VirtualgPrivategNetworkg(VPN)gservice
b. Linux
c. CommandgLinegInterface
d. TORgNetworkg-gVirtualgPrivategNetworkg(VPN)gservice
Angorganizationgisgconcernedgaboutgbrutegforcegattacks.gH
owgshouldgthegorganizationgcountergthisgrisk?
a. Installgagmantrapgandgbiometricgscannergatgthegentrancegofgitsgdatagcenter.
b. Implementgagsystemghardeninggpolicygthatgensuresgoperatinggsystemgupdatesgan
dgsoftwaregpatchesgareginstalledgregularly.
c. Institutegaglog-
ingpolicygthatglocksgusersgoutgofgangaccountgaftergthreegfailedgpasswordgattempts.
d. Initiategrole-
basedgaccessgtogitsgsystemsgtogreducegthegpossibilitygofgescalatedgprivileges.g-
gc.gInstitutegaglog-
ingpolicygthatglocksgusersgoutgofgangaccountgaftergthreegfailedgpasswordgattempts.
Angorganizationgsuffersgagsocialgengineeringgattackgthatgresultsgingagcybercriminalgg
aininggaccessgtogitsgnetworksgandgtogitsgcustomers'gprivateginformation.
Howgcangthegorganizationgmitigategthisgriskgingthegfuture?
a. Updategusergantivirusgsoftwaregtogtheglatestgversion
b. Implementgagstrongergpasswordgpolicy
c. Providegregulargcybersecuritygtraininggforgemployees
d. Installgagsophisticatedgintrusiongdetectiongsystemg-
gc.gProvidegregulargcybersecuritygtraininggforgemployees
WhichgOSIglayergisgrelatedgtogthegfunctiongofgthegIPgprotocolgsuite?
a. Transport
b. Network
g g g g g g
025 Objective Assessment Verified Questions and A
g g g g g g
nswers 100% Graded A+
g g g
IngwhichgphysicalgLANgtopologygaregnodesgconnectedgtogeachgothergwithgagbackbonegca
blegthatgloopsgaroundgandgendsgatgthegsamegpointgitgstarted?
a. Ring
b. Bus
c. Star
d. Treeg-gRing
WhichgOSIglayergensuresgerror-freegpackets?
a. Application
b. Transport
c. Session
d. Presentationg-gTransport
Whichgtopologygusesgagswitchgorghubgtogconnectgtogallgdevicesgingthegsamegnetwork?
a. Mesh
b. Ring
c. Star
d. Busg-gStar
Whichgcloudgservicegprovidesghardware,goperatinggsystems,gandgwebgserversgbutgn
otgend-usergapplications?
a. IaaS
b. PaaS
c. SaaS
d. RaaSg-gPaaS
Whichgcloudgmodelgprovidesgangexclusivegcloudgcomputinggservicegenvironmentgthatgisgsha
redgbetweengtwogorgmoregorganizations?
a. Public
b. Private
c. Community
d. Hybridg-gCommunity
,Whichgtypegofgsoftwaregisgusedgtogprovidegvirtualization?
a. Database
b. Hypervisor
c. Antivirus
d. Spreadsheetg-gHypervisor
Agusergthatgdoesgnotgwantgtogbegidentifiedgwhilegcommunicatinggongagnetworkgusesganga
pplicationgtogaltergthegcomputer'sgidentity.gWhichgtypegofgexploitgisgbeinggperpetrated?
a. Denial-of-service
b. ARPgpoisoning
c. Smurfgattack
d. Spoofingg-gSpoofing
Angattackergattemptsgtogmisdirectgtrafficgongagnetworkgbackgtogthegattackergbygcorrupting
gthegnetworkgcomputer'sgcachegofgIPgaddressgtogMACgaddressgmappingsgthatgaregcache
d.gWhichgexploitgisgthegattackergperpetrating?
a. Portgscanning
b. Wiretapping
c. Denial-of-service
d. ARPgpoisoningg-gARPgpoisoning
Whichgexploitgactuallygbreachesgthegphysicalgmediumgorgusesgdevicesgtogmonitorgsignal
sgfromgoutsidegthegphysicalgmediumgitself?
a. Spoofing
b. Wiretapping
c. Sniffing
d. Portgscanningg-gWiretapping
Whichgtypegofgattackgcangoverwhelmgagwebgservergbyginsertinggmoregdatagintogagwebgf
ormgthangthegsystemgwasgconfiguredgtoghold?
a. Buffergoverflow
b. ARPgpoisoning
c. Sessionghijacking
d. Cross-sitegscriptingg-gBuffergoverflow
Whichgtypegofgattackgsendsgangemailgclaiminggtogbegfromgagreputablegbusinessgingorder
gtogenticegthegrecipientgtogprovidegsensitiveginformation?
a. Denial-of-service
b. Phishing
c. Passwordgattacks
,d. Man-in-the-middleg-gPhishing
Agusergongagnetworkgisgplanninggtoglaunchgangexploitgagainstgagcoworkergingagneighboringgd
epartment.gThegusergneedsgtogidentifygthegIPgaddressgofgagcoworkergingthegdesiredgdepartm
ent.gWhichgtoolgorgutilitygwillgallowgthegusergtogwatchgnetworkgtrafficgingrealgtimegtogidentifyga
gtarget?
a. Portgscan
b. Antivirusgsoftware
c. Sniffer
d. Portgredirectiong-gSniffer
Whichggroupgofgattackersgisgtypicallygusedgforgpenetrationgtesting?
a. RedgTeam
b. BluegTeam
c. WhitegTeam
d. GraygTeamg-gRedgTeam
Whichgtypegofgattackgexploitsgangunpatchedgsoftwaregvulnerability?
a. Zero-day
b. Brue-force
c. Diffie-Hellman
d. Man-in-the-middleg-gZero-day
AgcompanyghasgthegpolicygthatgallgnewgusergpasswordsgaregP@ssw0rdgbutgdoesgnotgr
equiregnewgusersgtogchangegtheirgpassword.gAngemployeegrandomlygtriesgagcoworker's
gaccountgwithgthegnewgusergpasswordgtogseegifgtheygcangloggingasgthegcoworker.gWhich
gtypegofgvulnerabilitygdoesgthisgcreate?
a. BYOD
b. Weakgpassword
c. Defaultgpassword
d. Misconfiguredgfirewallgrulesg-gDefaultgpassword
Angemployeegthatgdoesgnotgwantgtogmissgemailsgfromgimportantgclientsgsetsgupgherg
cellulargsmartphonegtogallowghergtogcheckgemail.gUnfortunately,gshegdoesgnotginstallg
antivirusgsoftwaregongthegcellulargphone.gWhatgtypegofgvulnerabilitygisgrepresented?
a. Industrygthreat
b. Misconfiguredgfirewallgrules
c. Weakgpasswords
d. BYOD/Mobileg-gBYOD/Mobile
Whatgisgthegdefinitiongofgvulnerability,gingcomputergsecurity?
, a. Itgisgagweaknessgwhichgcangbegexploitedgbygagthreat,gsuchgasgangattacker,gtogperfor
mgunauthorizedgactionsgwithingagcomputergsystem.
b. Itgisgagpossiblegdangergthatgmightgexploitgagweaknessgtogbreachgsecuritygandgtherefor
egcausegpossiblegharm.
c. Itgisgangactiongtakengbygagthreatgthatgexploitsgagweaknessgthatgattemptsgtogeithergblo
ckgauthorizedgaccessgtogangassetgorgtoggaingunauthorizedgaccessgtogangasset.
d. Itgisgthegpotentialgofgagthreatgtogexploitgagweaknessgviagangattack.g-
gItgisgagweaknessgwhichgcangbegexploitedgbygagthreat,gsuchgasgangattacker,gtogperformgu
nauthorizedgactionsgwithingagcomputergsystem.
Whatgisgrequiredgtogestablishgagsecuregconnectiongtogagremotegnetworkgoverganginsecur
eglink?
a. VirtualgPrivategNetworkg(VPN)gservice
b. Linux
c. CommandgLinegInterface
d. TORgNetworkg-gVirtualgPrivategNetworkg(VPN)gservice
Angorganizationgisgconcernedgaboutgbrutegforcegattacks.gH
owgshouldgthegorganizationgcountergthisgrisk?
a. Installgagmantrapgandgbiometricgscannergatgthegentrancegofgitsgdatagcenter.
b. Implementgagsystemghardeninggpolicygthatgensuresgoperatinggsystemgupdatesgan
dgsoftwaregpatchesgareginstalledgregularly.
c. Institutegaglog-
ingpolicygthatglocksgusersgoutgofgangaccountgaftergthreegfailedgpasswordgattempts.
d. Initiategrole-
basedgaccessgtogitsgsystemsgtogreducegthegpossibilitygofgescalatedgprivileges.g-
gc.gInstitutegaglog-
ingpolicygthatglocksgusersgoutgofgangaccountgaftergthreegfailedgpasswordgattempts.
Angorganizationgsuffersgagsocialgengineeringgattackgthatgresultsgingagcybercriminalgg
aininggaccessgtogitsgnetworksgandgtogitsgcustomers'gprivateginformation.
Howgcangthegorganizationgmitigategthisgriskgingthegfuture?
a. Updategusergantivirusgsoftwaregtogtheglatestgversion
b. Implementgagstrongergpasswordgpolicy
c. Providegregulargcybersecuritygtraininggforgemployees
d. Installgagsophisticatedgintrusiongdetectiongsystemg-
gc.gProvidegregulargcybersecuritygtraininggforgemployees
WhichgOSIglayergisgrelatedgtogthegfunctiongofgthegIPgprotocolgsuite?
a. Transport
b. Network