100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C172 Network and Security Foundations – Firewalls 53 Questions with Verified Answers,100% CORRECT $11.99   Add to cart

Exam (elaborations)

WGU C172 Network and Security Foundations – Firewalls 53 Questions with Verified Answers,100% CORRECT

 4 views  0 purchase
  • Course
  • WGU C172 Network and Security Foundations
  • Institution
  • WGU C172 Network And Security Foundations

WGU C172 Network and Security Foundations – Firewalls 53 Questions with Verified Answers

Preview 2 out of 6  pages

  • October 13, 2024
  • 6
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU C172 Network and Security Foundations
  • WGU C172 Network and Security Foundations
avatar-seller
paulhans
WGU C172 Network and Security Foundations – Firewalls 53
Questions with Verified Answers

A network firewall analyzes each packet against a set of security criteria before
deciding to allow or block. This approach is known as: - CORRECT ANSWER Rule-
Based Access Control

A stateful firewall uses Stateful Packet Inspection to protect the network. How
does this type of firewall operate? - CORRECT ANSWER A stateful firewall that
compares all inbound traffic to ensure there is a prior outbound request.

While setting up a Wi-Fi network, the network administrator decides to use a
wireless encryption method that includes each device using a unique encryption
key. Which protocol is the administrator choosing? - CORRECT ANSWER WPA3

Which wireless infrastructure mode uses a central wireless device, such as a
wireless router or wireless access point? - CORRECT ANSWER Infrastructure

In a scenario where an organization groups employees with similar job functions
together and assigns identical permissions to each group, what type of access
control is being used? - CORRECT ANSWER Role-based

An organization is looking to utilize a Firewall that can help prevent attacks, such
as SQL Injection and Buffer Overflow attacks. Which type of Firewall can assist in
this situation by inspecting the network payload of each packet? - CORRECT
ANSWER Application Firewall

What attack involves sending disassociation frames to wireless devices, thus
disconnecting clients from the wireless network? - CORRECT ANSWER
Deauthentication attack

What is a proxy server? - CORRECT ANSWER A server that authenticates and
makes request on behalf of another system on the network

, An organization is deploying a sophisticated firewall that examines both individual
packets and their collective grouping. What type of access control does this
represent? - CORRECT ANSWER Context-based

Which type of Firewall inspects the source and destination IP address and Port
address (contained in the packet header) for every single packet that enters and
leaves the network? - CORRECT ANSWER Packet Filtering Firewall

In a DAC (Discretionary Access Control) system, who typically has the authority to
set or change permissions? - CORRECT ANSWER The owner of the resource

Firewall - CORRECT ANSWER A part of a computer system or network designed to
block unauthorized access while permitting outward communication.

Stateful Inspection Firewall - CORRECT ANSWER The inbound and outbound data
packets are compared to determine if a connection should be allowed.

Proxy Server - CORRECT ANSWER The client gets access to the network via the
____________________________. This step is used to authenticate the user,
establish the session, and set policies.

Packet Filtering Firewall - CORRECT ANSWER Can also limit information moving
from one segment to another.

Packet Filtering Firewall - CORRECT ANSWER Explicit ports must be opened to
allow incoming and outgoing traffic.

Stateful Inspection Firewall - CORRECT ANSWER A
_____________________________ type of Firewall operates at OSI Layers 3
(Network), 4 (Transport), 5 (Session).

Firewall - CORRECT ANSWER ________________ rules are called Access Control
Lists (ACLs).

Application Level Firewall - CORRECT ANSWER The
________________________________ Firewall operates at OSI Level 7 and
below.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller paulhans. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75759 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.99
  • (0)
  Add to cart