100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU D482 Exam 2025 Questions and Answers

Puntuación
-
Vendido
-
Páginas
18
Grado
A+
Subido en
22-05-2025
Escrito en
2024/2025

WGU D482 Exam 2025 Questions and Answers A laptop has been stolen, and the data has been seen for sale on the darknet. Which process could have protected the confidentiality of the data? - ANS Hard Drive Encryption Classify each attack method in relation to its direct impact on the CIA triad. - ANS Key Logger: Confidentiality DNS Poisoning: Integrity Covert Channels: Confidentiality DDoS: Availability A security administrator has configured a small keysize to protect the VPN. Which security objective does this affect? - ANS Confidentiality A laptop has been stolen, and the data has been seen for sale on the darknet. Which process could have protected the confidentiality of the data? - ANS Hard Drive encryption When browsing to a financial website, a user receives an error on the browser that points to the certificate on the website. The user reviews the certificate and maps it to a known certificate authority. Why did the user need to perform these actions? - ANS To establish a trust relationship Pg. 2 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED. A team of scientists is working on a secure project. The network administrator needs to configure a network for the team that is not routable from the Internet. A firewall is protecting the scientists' network and is using network address translation (NAT) to translate the internal IP addresses to public IP addresses. Which IP address should the network administrator configure on the inside interface of the firewall? - ANS 10.14.15.16 An ad hoc network design team has just finished a presentation on the latest updates to the organization's network infrastructure. The team ensured that plenty of redundancy has been built in and bottlenecks have been eliminated. Which security objective has the team bolstered through these improvements? - ANS Availability A company has recently implemented a new email encryption system that uses public key infrastructure (PKI). The company is now requiring all employees to sign and encrypt internal communication. An employee wants to send a digitally signed message to the IT director. What does the IT director use to decode the employee's signature under the new system? - ANS The employee's public key An administrator at a small office is tasked with supporting a new time clock that has been installed on the network. The outsourced company managing the time clock states that the connection protocol it uses with the clock is encrypted, but it needs to allow incoming connections from the Internet. Pg. 3 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED. Which action should allow the outsourced company to securely manage the time clock with a minimal amount of configuration effort? - ANS Setting up a port forward on the firewall from the outsourced company to the time clock A small nonprofit company has received several legacy wireless access points (APs) as a donation. The security administrator discovers that the encryption protocol the devices use is not very secure. The encryption key can be discovered by a malicious hacker in only a few minutes. After discussions with other security professionals, the administrator learns the APs can implement a key protocol that can change the encryption key every few seconds and provide a per-packet verification at each side of the communication. Which security measure is the key protocol implemented to protect? - ANS Integrity of the key A recently terminated employee from accounting used several widely available programs in an amateur attempt to exploit a company's database. Which term describes the terminated employee? - ANS Script kiddies An organization has recently undergone a period of growth, both in terms of business operations and personnel. The network infrastructure has kept pace, growing to accommodate the new size and structure. Mapping and

Mostrar más Leer menos
Institución
WGU D482
Grado
WGU D482










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU D482
Grado
WGU D482

Información del documento

Subido en
22 de mayo de 2025
Número de páginas
18
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU D482 Exam 2025 Questions and
Answers



A laptop has been stolen, and the data has been seen for sale on the darknet. Which process
could have protected the confidentiality of the data? - ANS Hard Drive Encryption



Classify each attack method in relation to its direct impact on the CIA triad. - ANS Key Logger:
Confidentiality
DNS Poisoning: Integrity
Covert Channels: Confidentiality
DDoS: Availability


A security administrator has configured a small keysize to protect the VPN.

Which security objective does this affect? - ANS Confidentiality


A laptop has been stolen, and the data has been seen for sale on the darknet.

Which process could have protected the confidentiality of the data? - ANS Hard Drive
encryption


When browsing to a financial website, a user receives an error on the browser that points to
the certificate
on the website. The user reviews the certificate and maps it to a known certificate authority.

Why did the user need to perform these actions? - ANS To establish a trust relationship




Pg. 1 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.

,A team of scientists is working on a secure project. The network administrator needs to
configure a
network for the team that is not routable from the Internet. A firewall is protecting the
scientists' network
and is using network address translation (NAT) to translate the internal IP addresses to public IP
addresses.
Which IP address should the network administrator configure on the inside interface of the
firewall? - ANS 10.14.15.16


An ad hoc network design team has just finished a presentation on the latest updates to the
organization's
network infrastructure. The team ensured that plenty of redundancy has been built in and
bottlenecks
have been eliminated.
Which security objective has the team bolstered through these improvements? -
ANS Availability


A company has recently implemented a new email encryption system that uses public key
infrastructure
(PKI). The company is now requiring all employees to sign and encrypt internal communication.
An
employee wants to send a digitally signed message to the IT director.
What does the IT director use to decode the employee's signature under the new system? -
ANS The employee's public key


An administrator at a small office is tasked with supporting a new time clock that has been
installed on the
network. The outsourced company managing the time clock states that the connection protocol
it uses
with the clock is encrypted, but it needs to allow incoming connections from the Internet.




Pg. 2 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.

, Which action should allow the outsourced company to securely manage the time clock with a
minimal

amount of configuration effort? - ANS Setting up a port forward on the firewall from the
outsourced company to the
time clock


A small nonprofit company has received several legacy wireless access points (APs) as a
donation. The
security administrator discovers that the encryption protocol the devices use is not very secure.
The encryption key can be discovered by a malicious hacker in only a few minutes. After
discussions with other
security professionals, the administrator learns the APs can implement a key protocol that can
change the
encryption key every few seconds and provide a per-packet verification at each side of the
communication.

Which security measure is the key protocol implemented to protect? - ANS Integrity of the
key


A recently terminated employee from accounting used several widely available programs in an
amateur
attempt to exploit a company's database.

Which term describes the terminated employee? - ANS Script kiddies


An organization has recently undergone a period of growth, both in terms of business
operations and
personnel. The network infrastructure has kept pace, growing to accommodate the new size
and
structure. Mapping and auditing of the expanded network needs to be done. One of the first
findings is
that the router has permissive rights to all unassigned ports.

What is this finding an example of? - ANS A vulnerability

Pg. 3 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.
$12.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
StarGuide Liberty University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
16
Miembro desde
1 año
Número de seguidores
0
Documentos
2591
Última venta
1 semana hace
FIRST CLASS GALORE

Accurate Exam Study Materials.Verified And Updated By Professionals.

4.3

4 reseñas

5
1
4
3
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes