100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D315 Network and Security Foundation Exam 232 Questions with Verified Answers,100% CORRECT $17.49   Add to cart

Exam (elaborations)

WGU D315 Network and Security Foundation Exam 232 Questions with Verified Answers,100% CORRECT

 0 view  0 purchase
  • Course
  • WGU D315 Network and Security Foundation
  • Institution
  • WGU D315 Network And Security Foundation

WGU D315 Network and Security Foundation Exam 232 Questions with Verified Answers

Preview 4 out of 31  pages

  • October 13, 2024
  • 31
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU D315 Network and Security Foundation
  • WGU D315 Network and Security Foundation
avatar-seller
paulhans
WGU D315 Network and Security Foundation Exam 232
Questions with Verified Answers
Which OSI layer is related to the IP protocol - CORRECT ANSWER Network 3

Which OSI layer is organizing the bits over the physical layer between devices in
the same collision domain? - CORRECT ANSWER Data Link 2 - They are in the same
Frame

Which OSI layer is a Switch at? - CORRECT ANSWER Data Link 2

Which OSI layer is a WAP (Wireless Access Point) at? - CORRECT ANSWER Data
Link 2

Which OSI layer is a router at - CORRECT ANSWER Network (3)

TCP protocol is on what OSI layer - CORRECT ANSWER Transport (4)

OSI layer 1 - CORRECT ANSWER Physical Layer (Cable, Hubs, Repeaters)

OSI layer 2 - CORRECT ANSWER Data Link Layer (Frame, Switch, PPP, Ethernet)

OSI layer 3 - CORRECT ANSWER Network Layer (Moves packets, IP)

OSI layer 4 - CORRECT ANSWER Transport Layer (TCP, end to end connection)

OSI Layer 5 - CORRECT ANSWER Session Layer (API, Sockets, Synch and send to
port)

OSI layer 6 - CORRECT ANSWER Presentation layer (Syntax and encryption layer,
SSL, SSH, JPEG)

OSI layer 7 - CORRECT ANSWER Application layer (end user layer, http,
applications)

,Network Typology point to point - CORRECT ANSWER Two devices connect
directly

Network Typology bus - CORRECT ANSWER All devices connect to a central main
line

Network Typology Ring - CORRECT ANSWER All devices have two connections and
form an endless ring

Network Typology Star - CORRECT ANSWER All devices connect to a central point

Network Typology Tree - CORRECT ANSWER Multiple devices connect together
(on a switch) and then the switches are connected with each other

Network Typology Mesh - CORRECT ANSWER All devices connect directly to each
other

Network Typology Hybrid - CORRECT ANSWER Multiple Network Typology within
the network

Cloud - where do I manage the OS Iaas or Paas? - CORRECT ANSWER Iaas

What do I manage on Paas (2) - CORRECT ANSWER Application and Data

Name the 3 CIA triades - CORRECT ANSWER Integrity, Availability and
Confidentiality

What is the CIA Triade Integrity? - CORRECT ANSWER Detects alteration in
storage, transit and process

What is the CIA Triade Availability? - CORRECT ANSWER Ensure Authorized
Access, Performance and Backup
Keeping unauthorized users out is not in this triade.

What is the CIA Triade Confidentiality? - CORRECT ANSWER Protect from
unauthorized access and use, protecting data access in storage, transit and
process

,100m long Cat 5 cable supports speeds up to - CORRECT ANSWER 100 Mb/s

100m long Cat 5e cable supports speeds up to - CORRECT ANSWER 1000 Mb/s or
1 Gb/s

100m long Cat 6 cable supports speeds up to - CORRECT ANSWER 10 Gb/s

100m long Cat 6a cable supports speeds up to - CORRECT ANSWER 10 Gb/s

Does a firewall provide two way protection? - CORRECT ANSWER Yes, it protects
ingress and egress data

Firewall that only checks the address label - CORRECT ANSWER Packet Filter

On what OSI level is a Packet Filter operating - CORRECT ANSWER Transport
(checks TCP/UDP prot numbers) and Network (checks source and destination IP)

What is a circuit level gateway - CORRECT ANSWER A firewall that conceals the
true identity of the protected network (hides IP) on the transport (4) layer

What does state in stateful mean? - CORRECT ANSWER It refers to the connection
state between two computers

Why do we need the 5th layer on a Stateful Inspection - CORRECT ANSWER In this
connection, the firewall is creating temporary rules per session to permit
communication (TCP) back to the sender.

What is a stateful inspection - CORRECT ANSWER It reduces the amount of
firewall rules. Firewall vendors implemented a feature that only needs one rule to
allow the initial communication.

How do we protect the application level with a firewall - CORRECT ANSWER With
a proxy server, Middle man or Layer 7 firewall

Can a packet filter firewall scan the packet content? - CORRECT ANSWER No, a
layer 7 or proxy is needed

, What is a IDS - CORRECT ANSWER Intrusion Detection system. A system for
detecting attempting intrusion. Related to intrusion prevention systems (IPS) that
block suspected attacks

What is IPS - CORRECT ANSWER Intrusion Prevention System that can block traffic
if a malicious anomaly is detected

Cyber Attack - Ransomware - CORRECT ANSWER Encrypts data. Attacker sells the
key. Prevent with Virus scanner

Cyber Attack - Man in the Middle - CORRECT ANSWER Eaves dropping. The data
flows thru the middle man. The attacker can stop/change the data

Cyber Attack - Zero Day exploit - CORRECT ANSWER New unheard vulnerability.
Needs to be patched

Cyber Attack - DNS tunneling - CORRECT ANSWER An attacker creates a bad server
and connects it to the attacked domain name system. If now a request comes to
the attacked server, the attacker can tunnel into the client and since dns
connections are rarely monitored, the attacker stays hidden.

Cyber Attack - XXS attack - CORRECT ANSWER Cross Site Scripting uses a web form
to inject malicious code.

Cyber Attack - Social engineering - CORRECT ANSWER Convince someone to give a
you access to sensitive information

Cyber Attack - DoS and DDos - CORRECT ANSWER Denial of Service attacks flood a
server with too much traffic

Cyber Attack - SQL Injection - CORRECT ANSWER A technique to add a string of sql
code to a query to gain access to the targeted database

Cyber Attack - ARP Poisoning / ARP Spoofing - CORRECT ANSWER LAN attack that
sends malicious Address Resolution Protocol packets to a default gateway in
order to change the IP to MAC pairings

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller paulhans. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $17.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76800 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$17.49
  • (0)
  Add to cart