100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D315 - PRE-ASSESSMENT: NETWORK AND SECURITY – FOUNDATIONS/ Updated Questions with Correct Answers -Latest 2024. $16.49   Add to cart

Exam (elaborations)

WGU D315 - PRE-ASSESSMENT: NETWORK AND SECURITY – FOUNDATIONS/ Updated Questions with Correct Answers -Latest 2024.

 5 views  0 purchase
  • Course
  • WGU D315
  • Institution
  • WGU D315

WGU D315 - PRE-ASSESSMENT: NETWORK AND SECURITY – FOUNDATIONS/ Updated Questions with Correct Answers -Latest 2024.

Preview 4 out of 53  pages

  • August 31, 2024
  • 53
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU D315
  • WGU D315
avatar-seller
PastPapers
WGU D315 - PRE-ASSESSMENT: NETWORK AND SECURITY
– FOUNDATIONS/ Updated Questions with Correct
Answers -Latest 2024.

Which type of attack exploits an unpatched software vulnerability?

a. Zero-day

b. Brue-force

c. Diffie-Hellman

d. Man-in-the-middle - Correct Answer - Zero-day



A company has the policy that all new user passwords are P@ssw0rd but does not require new users to
change their password. An employee randomly tries a coworker's account with the new user password
to see if they can log in as the coworker. Which type of vulnerability does this create?

a. BYOD

b. Weak password

c. Default password

d. Misconfigured firewall rules - Correct Answer - Default password



An employee that does not want to miss emails from important clients sets up her cellular smartphone
to allow her to check email. Unfortunately, she does not install antivirus software on the cellular phone.
What type of vulnerability is represented?

a. Industry threat

b. Misconfigured firewall rules

c. Weak passwords

d. BYOD/Mobile - Correct Answer - BYOD/Mobile



What is the definition of vulnerability, in computer security?

a. It is a weakness which can be exploited by a threat, such as an attacker, to perform unauthorized
actions within a computer system.



pg. 1

,b. It is a possible danger that might exploit a weakness to breach security and therefore cause
possible harm.

c. It is an action taken by a threat that exploits a weakness that attempts to either block authorized
access to an asset or to gain unauthorized access to an asset.

d. It is the potential of a threat to exploit a weakness via an attack. - Correct Answer - It is a
weakness which can be exploited by a threat, such as an attacker, to perform unauthorized actions
within a computer system.



What is required to establish a secure connection to a remote network over an insecure link?

a. Virtual Private Network (VPN) service

b. Linux

c. Command Line Interface

d. TOR Network - Correct Answer - Virtual Private Network (VPN) service



An organization is concerned about brute force attacks.

How should the organization counter this risk?

a. Install a mantrap and biometric scanner at the entrance of its data center.

b. Implement a system hardening policy that ensures operating system updates and software
patches are installed regularly.

c. Institute a log-in policy that locks users out of an account after three failed password attempts.

d. Initiate role-based access to its systems to reduce the possibility of escalated privileges. - Correct
Answer - c. Institute a log-in policy that locks users out of an account after three failed password
attempts.



An organization suffers a social engineering attack that results in a cybercriminal gaining access to its
networks and to its customers' private information.

How can the organization mitigate this risk in the future?

a. Update user antivirus software to the latest version

b. Implement a stronger password policy

c. Provide regular cybersecurity training for employees

d. Install a sophisticated intrusion detection system - Correct Answer - c. Provide regular
cybersecurity training for employees


pg. 2

,An attacker plans to exploit flaws in an operating system to gain access to a user's computer system.
What is a prevention mechanism for this type of attack?

a. Firewall

b. Patching

c. Antivirus

d. Virtual Private Network (VPN) - Correct Answer - b. Patching



An unauthorized third-party has gained access to a company network.

How can they be prevented from deleting data?

a. Access controls

b. Physical controls

c. Biometrics

d. Man trap - Correct Answer - a. Access controls



An attacker has gained access to the passwords of several employees of a company through a brute force
attack. Which authentication method would keep the attacker from accessing the employees' devices?

a. MFA (multi-factor authentication)

b. AAA (authentication, authorization, and accounting)

c. PKI (public key infrastructure)

d. TCP/IP (transmission control protocol/internet protocol - Correct Answer - a. MFA (multi-factor
authentication)



After downloading a CD/DVD burning program, a user notices that someone is remotely accessing the
computer during nighttime hours.

Which type of malware is likely found in the CD/DVD software?

a. Virus

b. Adware

c. Worm

d. Trojan horse - Correct Answer - d. Trojan horse



pg. 3

, A user is working on a home computer when another user seems to open an application to view
documents on the same computer. The user immediately suspects that a back door into the computer
exists.Which action should be taken first to deal with the problem?

a. Close the application the remote user opened

b. Begin running antivirus scans

c. Unplug the PC's network connection

d. Open task manager to determine which applications are running - Correct Answer - c. Unplug
the PC's network connection



Which Internet access technology uses ordinary telephone wires for data transmission? a.

DSL

b. Cable

c. Wi-Fi

d. Hotspot - Correct Answer - DSL



Which device is used to organize network cables as they run between switches and other network
devices?

a. Jack

b. Hub

c. Patch Panel

d. Router - Correct Answer - Patch Panel



Which network device is used to connect two or more network segments by performing OSI layer 3
functions like packet-forwarding?

a. Router

b. Repeater

c. Wire

d. Switch - Correct Answer - Router




pg. 4

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller PastPapers. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $16.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76669 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$16.49
  • (0)
  Add to cart