100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C700| 301 QUESTIONS WITH COMPLETE ANSWERS

Rating
-
Sold
-
Pages
24
Grade
A+
Uploaded on
19-10-2022
Written in
2022/2023

An organization that uses a client-server model permits remote user machines to access its network and distributed resources. With this setup, the organization recognizes that remotely used client machines can become threats. Which requirement should this company subject its remote clients to in order to secure data and communications in the system? Correct Answer: Install restricted user-interface mechanisms and database management systems A technology-based firm wants to implement secure data communication between secure desktops to a remote server while keeping reliability as the most important requirement in its scope. Which kind of secure data communication should be used within a WAN environment? Correct Answer: Transmission control protocol (TCP) A systems developer needs to create a subscription system for a list of known email abuse sources. Which solution should be used to create this item? Correct Answer: Blacklist services Which service manages the monitoring of devices within the application layer? Correct Answer: Simple network management protocol (SNMP) A software developer needs to secure emails for a bank using a public-private key system. The system should include a variety of algorithms that encrypt files and email messages. Which email security solution should this developer use? Correct Answer: Pretty good privacy Which service is managed at the transport layer of the TCP/IP stack? Correct Answer: User datagram protocol (UDP) Which layer of TCP/IP composes the simplex connectionless protocol user datagram protocol (UDP)? Correct Answer: Transport Which layer of the OSI model is affected if a data center experienced a power outage with no backup power supply? Correct Answer: Physical Which layer is affected if an organization has weak authentication communication protocols? Correct Answer: Session How would hackers sniff net

Show more Read less
Institution
Course

Content preview

WGU C700| 301 QUESTIONS WITH
COMPLETE ANSWERS
An organization that uses a client-server model permits remote user machines to access its
network and distributed resources. With this setup, the organization recognizes that remotely
used client machines can become threats.

Which requirement should this company subject its remote clients to in order to secure data and
communications in the system? Correct Answer: Install restricted user-interface mechanisms
and database management systems

A technology-based firm wants to implement secure data communication between secure
desktops to a remote server while keeping reliability as the most important requirement in its
scope.

Which kind of secure data communication should be used within a WAN environment? Correct
Answer: Transmission control protocol (TCP)

A systems developer needs to create a subscription system for a list of known email abuse
sources.

Which solution should be used to create this item? Correct Answer: Blacklist services

Which service manages the monitoring of devices within the application layer? Correct Answer:
Simple network management protocol (SNMP)

A software developer needs to secure emails for a bank using a public-private key system. The
system should include a variety of algorithms that encrypt files and email messages.

Which email security solution should this developer use? Correct Answer: Pretty good privacy

Which service is managed at the transport layer of the TCP/IP stack? Correct Answer: User
datagram protocol (UDP)

Which layer of TCP/IP composes the simplex connectionless protocol user datagram protocol
(UDP)? Correct Answer: Transport

Which layer of the OSI model is affected if a data center experienced a power outage with no
backup power supply? Correct Answer: Physical

Which layer is affected if an organization has weak authentication communication protocols?
Correct Answer: Session

,How would hackers sniff network traffic during an address resolution protocol (ARP) poisoning
attack? Correct Answer: By changing the target computer's ARP cache with a forged ARP
request

A consultant explains that there is no mechanism within internet control message protocol
(ICMP) for the retransmission of lost or damaged packets.

Why are ICMP error messages sent to the host? Correct Answer: They help the sending process
or its human user to diagnose problems.

According to error logs associated with the local area network (LAN), one of the layers of the
OSI model needs to be used to provide error correction.

Which layer should be used? Correct Answer: Transport

A software developer needs to disconnect a transmission control protocol (TCP) session when a
communication session is complete.

What is the first packet that ensures this process? Correct Answer: FIN flagged packet

A software developer establishes a communication between a web server and a web browser
over a network connection.

Which protocol is encapsulated in the transmission control protocol (TCP) to ensure this action?
Correct Answer: Hypertext transfer protocol (HTTP)

Which attack allows an attacker on the same subnet as its victims to eavesdrop on all network
traffic between the victims? Correct Answer: Man-in-the-middle (MITM) attack

Which protocol is used to transmit web page elements from a web server to web browsers?
Correct Answer: Hypertext transfer protocol (HTTP)

Which protocol provides background security support services for IPSec by negotiating,
establishing, modifying, and deleting security associations? Correct Answer: Internet security
association and key management protocol (ISAKMP)

Which approach will detect the presence of rogue wireless access points? Correct Answer:
Operating a wireless intrusion detection system (IDS)

A company needs to securely connect a client with the company's server. The security is handled
by the two hosts and the traffic carried belongs only to the two hosts.

Which interconnection provision should be used between this server and this client? Correct
Answer: Host-to-host virtual private network (VPN)

Two partnering companies are interested in connecting their respective IPSec gateways through a
secure connection.

, Which interconnection is needed to meet this goal? Correct Answer: Site-to-site virtual private
network (VPN)

An organization is interested in implementing a virtual private network (VPN) that will extend
the company's network to all the branches.

What is the appropriate VPN technology to deploy? Correct Answer: Site-to-site VPN

A network administrator needs to maintain a list of destination networks along with metrics of
direction using a protocol service that operates at the network layer.

Which protocol should be used? Correct Answer: Routing information protocol (RIP)

A network administrator is implementing a new virtual private network (VPN) for an
organization. The administrator needs to use a tunneling protocol that protects transmitted traffic
and supports the transmission of multiple protocols at the data link layer in the OSI model.

Which protocol should be used? Correct Answer: Layer 2 tunneling protocol (L2TP)

An institution is using a network application that supports an exchange of files.

Which application layer protocol should be used? Correct Answer: File transfer protocol (FTP)

A school uses a link state routing protocol at the network layer to maintain a topography map of
all connected networks.

Which protocol should be used? Correct Answer: Open shortest path first (OSPF)

An attacker used a packet sniffer to discover the secure service set identifier (SSID) of a wireless
network.

Which approach should be used to secure this network? Correct Answer: Wi-Fi protected access
2 (WPA2)

Which hardening feature should be used to isolate static environments to prevent changes or
exploits from reaching them? Correct Answer: Virtual local area network segmentation

Which hardening feature should be applied to improve security of a wireless network if the pool
of wireless clients is relatively small and static? Correct Answer: Enable media access control
(MAC) filtering

What should a network administrator do to ensure that the server operating system is up to date?
Correct Answer: Install patches

Which form of firewall control is implemented at the Layer 3 level of the OSI model? Correct
Answer: Static packet-filtering firewall

Written for

Institution
Course

Document information

Uploaded on
October 19, 2022
Number of pages
24
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$12.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Classroom NURSING
Follow You need to be logged in order to follow users or courses
Sold
4825
Member since
3 year
Number of followers
3228
Documents
54907
Last sold
1 day ago
NURSING

Assignments, Case Studies, Research, Essay writing service, Questions and Answers, Discussions etc. for students who want to see results twice as fast. I have done papers of various topics and complexities. I am punctual and always submit work on-deadline. I write engaging and informative content on all subjects. Send me your research papers, case studies, psychology papers, etc, and I’ll do them to the best of my abilities. Writing is my passion when it comes to academic work. I’ve got a good sense of structure and enjoy finding interesting ways to deliver information in any given paper. I love impressing clients with my work, and I am very punctual about deadlines. Send me your assignment and I’ll take it to the next level. I strive for my content to be of the highest quality. Your wishes come first— send me your requirements and I’ll make a piece of work with fresh ideas, consistent structure, and following the academic formatting rules. For every student you refer to me with an order that is completed and paid transparently, I will do one assignment for you, free of charge!!!!!!!!!!!!

Read more Read less
4.0

1176 reviews

5
622
4
214
3
192
2
39
1
109

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions