100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D482 (SECURE NETWORK DESIGN - D482) EXAM QUESTIONS AND ANSWERS |A+ GRADE $11.49   Add to cart

Exam (elaborations)

WGU D482 (SECURE NETWORK DESIGN - D482) EXAM QUESTIONS AND ANSWERS |A+ GRADE

 8 views  0 purchase
  • Course
  • WGU D482
  • Institution
  • WGU D482

WGU D482 (SECURE NETWORK DESIGN - D482) EXAM QUESTIONS AND ANSWERS |A+ GRADE

Preview 3 out of 19  pages

  • July 18, 2024
  • 19
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
  • WGU D482
  • WGU D482
avatar-seller
Ascorers
ASCORERS STUVIA
WGU D482 (SECURE NETWORK DESIGN - D482) EXAM
QUESTIONS AND ANSWERS |A+ GRADE
A company decides to implement Network Address Translation (NAT) and strict inbound access control after experiencing multiple breaches from external hosts connecting to its publicly available IP addresses. The system administrator verifies the Access Control List (ACL) is configured properly, but firewall log analysis still shows multiple external malicious hosts connected to internal company hosts. What should the security administrator
do to reduce the risk of further malicious connections? ANS: Implement an outbound ACL.
A company has been the target of multiple social engineering attacks and is implementing a new mandatory security awareness training program to reduce the risk of a future compromise. The security administrator is mainly concerned with the following attack vectors: Spoofed emails containing fake
password reset links aimed at harvesting employees' passwords Phone calls to the helpdesk by a malicious user pretending to be an employee needing a password reset A malicious user tailgating while impersonating a contractor to steal employees' mobile devices What are the two vulnerabilities that the company needs to address to meet the above requirements? ANS: Untrained users and Lack of Secure access control
A company has recently implemented a new email encryption system that uses public key infrastructure (PKI). The company is now requiring all employees to sign and encrypt internal communication. An employee wants to send a digitally signed message to the IT director. What does the IT director use to decode the employee's signature under the new system? ANS: The employee's public key
A company is concerned about employee usernames and passwords being obtained through phishing campaigns. Which emerging technology should the company employ to keep this from happening? ANS: Tokens ASCORERS STUVIA
A company is in the process of separating valid network traffic from malicious traffic. Currently, the company does not want to block valid traffic
that would cause an outage to an application. Which device will monitor and
classify potential malicious traffic to improve current policies? ANS: Intrusion Detection System (IDS)
A company needs an alternative to a VPN solution to provide secure communications between clients and servers within the extended organization. In addition to secure communications, eavesdropping and tampering with data while in transport must be prevented. Finally, endpoint authentication and confidentiality of communications must be provided. Which solution should be implemented based on these requirements? ANS: Secure Sockets Layer/Transport Layer Security (SSL/TLS)
A company's chief executive officer (CEO) is traveling overseas for a business meeting and wants to protect emails and video conference calls from a breach in confidentiality. Which strategy should be used to achieve this objective? ANS: Secure a VPN back into the corporate offices.
A company's chief information officer (CIO) has tasked the network security
team with a set of requirements for the next iteration of network security. The CIO wants a solution that will implement the following items:
Access control
Connectionless data integrity checking
Data origin authentication
Replay detection and rejection
Confidentiality using encryption
Traffic flow confidentiality
What provides this set of services? ANS: Internet Protocol Security (IPSec) ASCORERS STUVIA
A device on a network is pinging over 100 endpoints on the infrastructure. The IP and MAC addresses belong to the network management system. However, the MAC address has been spoofed. The machine is tracked down,
and it is an unknown rogue device that somehow got past the network admission control (NAC) device. Which action should be taken from this point forward? ANS: Contain and unplug this device from the network.
A firewall administrator is setting up the necessary rule to allow an email server to send and receive email. Which three elements does the Access Control List (ACL) need?
Choose 3 answers ANS: Source IP, Destination port, Base protocol
A firewall has been placed between two networks. Each network implements
a VPN concentrator to enable secure communication via a VPN in tunnel mode. What information regarding the VPN will the firewall logs provide? ANS: Information about the temporary encapsulation header
A firewall policy has an Access Control List (ACL), which allows a connection from a university that is not part of the company. Which description depicts what the company is currently doing that directly relates to this ACL? ANS: Running a web server on port 80
A laptop has been stolen, and the data has been seen for sale on the darknet. Which process could have protected the confidentiality of the data? ANS: Hard Drive encryption
A laptop has been stolen, and the data has been seen for sale on the darknet. Which process could have protected the confidentiality of the data? ANS: Hard Drive Encryption

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Ascorers. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

73091 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.49
  • (0)
  Add to cart