100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C700| 301 QUESTIONS WITH COMPLETE ANSWERS $12.49   Add to cart

Exam (elaborations)

WGU C700| 301 QUESTIONS WITH COMPLETE ANSWERS

 18 views  0 purchase
  • Course
  • Institution

An organization that uses a client-server model permits remote user machines to access its network and distributed resources. With this setup, the organization recognizes that remotely used client machines can become threats. Which requirement should this company subject its remote clients to ...

[Show more]

Preview 3 out of 24  pages

  • October 19, 2022
  • 24
  • 2022/2023
  • Exam (elaborations)
  • Questions & answers
avatar-seller
WGU C700| 301 QUESTIONS WITH
COMPLETE ANSWERS
An organization that uses a client-server model permits remote user machines to access its
network and distributed resources. With this setup, the organization recognizes that remotely
used client machines can become threats.

Which requirement should this company subject its remote clients to in order to secure data and
communications in the system? Correct Answer: Install restricted user-interface mechanisms
and database management systems

A technology-based firm wants to implement secure data communication between secure
desktops to a remote server while keeping reliability as the most important requirement in its
scope.

Which kind of secure data communication should be used within a WAN environment? Correct
Answer: Transmission control protocol (TCP)

A systems developer needs to create a subscription system for a list of known email abuse
sources.

Which solution should be used to create this item? Correct Answer: Blacklist services

Which service manages the monitoring of devices within the application layer? Correct Answer:
Simple network management protocol (SNMP)

A software developer needs to secure emails for a bank using a public-private key system. The
system should include a variety of algorithms that encrypt files and email messages.

Which email security solution should this developer use? Correct Answer: Pretty good privacy

Which service is managed at the transport layer of the TCP/IP stack? Correct Answer: User
datagram protocol (UDP)

Which layer of TCP/IP composes the simplex connectionless protocol user datagram protocol
(UDP)? Correct Answer: Transport

Which layer of the OSI model is affected if a data center experienced a power outage with no
backup power supply? Correct Answer: Physical

Which layer is affected if an organization has weak authentication communication protocols?
Correct Answer: Session

,How would hackers sniff network traffic during an address resolution protocol (ARP) poisoning
attack? Correct Answer: By changing the target computer's ARP cache with a forged ARP
request

A consultant explains that there is no mechanism within internet control message protocol
(ICMP) for the retransmission of lost or damaged packets.

Why are ICMP error messages sent to the host? Correct Answer: They help the sending process
or its human user to diagnose problems.

According to error logs associated with the local area network (LAN), one of the layers of the
OSI model needs to be used to provide error correction.

Which layer should be used? Correct Answer: Transport

A software developer needs to disconnect a transmission control protocol (TCP) session when a
communication session is complete.

What is the first packet that ensures this process? Correct Answer: FIN flagged packet

A software developer establishes a communication between a web server and a web browser
over a network connection.

Which protocol is encapsulated in the transmission control protocol (TCP) to ensure this action?
Correct Answer: Hypertext transfer protocol (HTTP)

Which attack allows an attacker on the same subnet as its victims to eavesdrop on all network
traffic between the victims? Correct Answer: Man-in-the-middle (MITM) attack

Which protocol is used to transmit web page elements from a web server to web browsers?
Correct Answer: Hypertext transfer protocol (HTTP)

Which protocol provides background security support services for IPSec by negotiating,
establishing, modifying, and deleting security associations? Correct Answer: Internet security
association and key management protocol (ISAKMP)

Which approach will detect the presence of rogue wireless access points? Correct Answer:
Operating a wireless intrusion detection system (IDS)

A company needs to securely connect a client with the company's server. The security is handled
by the two hosts and the traffic carried belongs only to the two hosts.

Which interconnection provision should be used between this server and this client? Correct
Answer: Host-to-host virtual private network (VPN)

Two partnering companies are interested in connecting their respective IPSec gateways through a
secure connection.

, Which interconnection is needed to meet this goal? Correct Answer: Site-to-site virtual private
network (VPN)

An organization is interested in implementing a virtual private network (VPN) that will extend
the company's network to all the branches.

What is the appropriate VPN technology to deploy? Correct Answer: Site-to-site VPN

A network administrator needs to maintain a list of destination networks along with metrics of
direction using a protocol service that operates at the network layer.

Which protocol should be used? Correct Answer: Routing information protocol (RIP)

A network administrator is implementing a new virtual private network (VPN) for an
organization. The administrator needs to use a tunneling protocol that protects transmitted traffic
and supports the transmission of multiple protocols at the data link layer in the OSI model.

Which protocol should be used? Correct Answer: Layer 2 tunneling protocol (L2TP)

An institution is using a network application that supports an exchange of files.

Which application layer protocol should be used? Correct Answer: File transfer protocol (FTP)

A school uses a link state routing protocol at the network layer to maintain a topography map of
all connected networks.

Which protocol should be used? Correct Answer: Open shortest path first (OSPF)

An attacker used a packet sniffer to discover the secure service set identifier (SSID) of a wireless
network.

Which approach should be used to secure this network? Correct Answer: Wi-Fi protected access
2 (WPA2)

Which hardening feature should be used to isolate static environments to prevent changes or
exploits from reaching them? Correct Answer: Virtual local area network segmentation

Which hardening feature should be applied to improve security of a wireless network if the pool
of wireless clients is relatively small and static? Correct Answer: Enable media access control
(MAC) filtering

What should a network administrator do to ensure that the server operating system is up to date?
Correct Answer: Install patches

Which form of firewall control is implemented at the Layer 3 level of the OSI model? Correct
Answer: Static packet-filtering firewall

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75323 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.49
  • (0)
  Add to cart