100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU Pre assessment D315 questions with verified answers.

Beoordeling
-
Verkocht
-
Pagina's
53
Cijfer
A+
Geüpload op
25-02-2025
Geschreven in
2024/2025

WGU Pre assessment D315 questions with verified answers.

Instelling
Vak











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
25 februari 2025
Aantal pagina's
53
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

WGU Pre assessment D315 questions with verified
answers
A city uses fiber optic cable to connect smaller networks throughout the whole
city.
Which type of network is described?


1) WLAN
2) SAN
3) MAN
4) WAN Ans✓✓✓-3) MAN


A Metropolitan Area Network (MAN) is designed to cover a city or a large campus,
connecting multiple Local Area Networks (LANs) within that area. It typically uses
high-speed fiber optic cables to provide efficient communication across a large
geographical area, such as a city.


A company is creating an information security policy document with many sub-
policies.
Which information should be included for each sub-policy to ensure the policy is
clear and comprehensive?


1) A rating of the sub-policy's importance
2) Compliance requirements the sub-policy is designed to meet
3) A list of similar or related sub-policies
4) Contact information for the regional government authority Ans✓✓✓-2)
Compliance requirements the sub-policy is designed to meet

,A company is developing a data protection methodology in order to improve data
protection measures.
What is a strategy that should be used?


1) Require that passwords change weekly
2) Implement wired equivalent privacy (WEP)
3) Avoid the use of asymmetric encryption
4) Implement authentication methodologies Ans✓✓✓-4) Implement
authentication methodologies


Authentication Methodologies: Authentication is a fundamental component of
data protection. Implementing strong authentication methodologies ensures that
only authorized individuals or systems can access sensitive data or resources. This
typically involves verifying the identity of users or devices through various
methods such as passwords, biometrics, two-factor authentication (2FA), or multi-
factor authentication (MFA).


A company is specifically worried about DoS/DDoS attacks.
Which strategy should be used as a mitigation against this type of attack?


1) Require complex passwords
2) Implement intrusion protection software
3) Monitor normal traffic patterns
4) Configure switch port tracing Ans✓✓✓-3) Monitor normal traffic patterns

,A company is updating the devices it provides to employees to ensure that each
employee has consistent network access.
What is the CIA triad component targeted in the scenario?


1) Availability
2) Application
3) Integrity
4) Confidentiality Ans✓✓✓-1) Availability


Availability: Availability ensures that information and resources are accessible and
usable when needed by authorized users. It focuses on ensuring that systems and
data are reliably available to legitimate users.


A company needs to maximize the number of virtual machines that can run on
each host.
Which hypervisor should be used?


1) Open source
2) Type 1
3) Type 2
4) Proprietary Ans✓✓✓-2) Type 1


Type 1 hypervisors, also known as bare-metal hypervisors, run directly on the
host's hardware without the need for a separate operating system. They are
optimized for performance and efficiency, making them ideal for environments
where maximizing the number of VMs per host is a priority.

, A company needs to specify security operations and management of all IT assets
within the seven domains of the IT infrastructure.
Which type of policy should be used?


1) Asset classification policy
2) Asset protection policy
3) Acceptable use policy
4) Asset management policy Ans✓✓✓-4) Asset management policy


Asset Management Policy: An Asset Management Policy defines how IT assets
(hardware, software, data) are managed throughout their lifecycle. It includes
procedures for acquisition, deployment, maintenance, and disposal of assets. This
policy ensures that assets are properly accounted for, maintained securely, and
used effectively to support business operations.


A company set up a firewall to analyze network traffic, considering each packet
and how groups of packets are used.
What is the form of access control involved in this scenario?


1) Discretionary
2) Rule-based
3) Context-based
4) Role-based Ans✓✓✓-3) Context-based
€16,73
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
cracker Chamberlain School Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2022
Lid sinds
3 jaar
Aantal volgers
1344
Documenten
47129
Laatst verkocht
2 dagen geleden
✨ Cracker – Verified Study Powerhouse

Welcome to your shortcut to academic and certification success. I'm Cracker, a trusted top seller I specialize in high-quality study guides, test banks, certification prep, and real-world exam material all tailored to help you pass fast and score high.

3,8

369 beoordelingen

5
162
4
84
3
52
2
22
1
49

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen