WGU D315 OBJECTIVE ASSESSMENT AND PA
NEWEST 2025 TEST BANK| NETWORK AND SECURITY
FOUNDATIONS D315 OA & PA EXAM WITH
COMPLETE 450 REAL EXAM QUESTIONS AND
CORRECT VERIFIED ANSWERS/ ALREADY GRADED
A+ (MOST RECENT!!)
Which type of Ethernet cable can maintain 10Gbps transmission speeds
through the course of its maximum 100-meter length? – ANSWER -
CAT 6a
Which Internet access technology uses ordinary telephone wires for data
transmission? – ANSWER - DSL
Which device is used to organize network cables as they run between
switches and other network devices? – ANSWER - Patch panel
Which network device is used to connect two or more network segments
by performing OSI layer 3 functions like packet-forwarding? –
ANSWER - Router
Which network device is used to convert between digital information
from a LAN and analog signals for transmission over a standard
telephone wire? – ANSWER - Modem
pg. 1
,2|Page
Which device could be used to send commands to the mainframe for
remote execution in early mainframe installations? – ANSWER - Dumb
terminals
Which device is responsible for implementing network address
translation (NAT)? – ANSWER - Router
Which command should be used to manually enter the default gateway
for a computer? – ANSWER - route
Which network diagnostic tool displays the path packets take between
two endpoints? – ANSWER - traceroute
Which network type is used to wire multiple PCs to a home router? –
ANSWER - LAN
An office's infrastructure connects network devices and printers through
a central access point without the use of cabling.
Which network type does this office use? – ANSWER - WLAN
What type of medium is commonly used within a 1000 Mbps Ethernet
network? – ANSWER - CAT5e
Which OSI layer ensures error-free packets? – ANSWER - Transport
pg. 2
,3|Page
Which topology uses a switch or hub to connect to all devices in the
same network? – ANSWER - Star
Which cloud service provides hardware, operating systems, and web
servers but not end-user applications? – ANSWER - PaaS
Which cloud model provides an exclusive cloud computing service
environment that is shared between two or more organizations? –
ANSWER - Community
Which type of software is used to provide virtualization? – ANSWER -
Hypervisor
A user that does not want to be identified while communicating on a
network uses an application to alter the computer's identity.
Which type of exploit is being perpetrated? – ANSWER - Spoofing
An attacker attempts to misdirect traffic on a network back to the
attacker by corrupting the network computer's cache of IP address to
MAC address mappings that are cached.
Which exploit is the attacker perpetrating? – ANSWER - ARP poisoning
Which exploit actually breaches the physical medium or uses devices to
monitor signals from outside the physical medium itself? – ANSWER -
Wiretapping
pg. 3
, 4|Page
Which type of attack can overwhelm a web server by inserting more
data into a web form than the system was configured to hold? –
ANSWER - Buffer overflow
Which type of attack sends an email claiming to be from a reputable
business in order to entice the recipient to provide sensitive information?
– ANSWER - Phishing
A user on a network is planning to launch an exploit against a coworker
in a neighboring department. The user needs to identify the IP address of
a coworker in the desired department.
Which tool or utility will allow the user to watch network traffic in real
time to identify a target? – ANSWER - Sniffer
Which group of attackers is typically used for penetration testing? –
ANSWER - Red team
Which type of attack exploits an unpatched software vulnerability? –
ANSWER - Zero-day
A company has the policy that all new user passwords are P@ssw0rd but
does not require new users to change their password. An employee
randomly tries a coworker's account with the new user password to see if
they can log in as the coworker.
Which type of vulnerability does this create? – ANSWER - Default
password
pg. 4