Package deal
BUNDLED NETWORK AND SECURITY - FOUNDATIONS QUESTIONS WITH COMPLETE SOLUTIONS
BUNDLED NETWORK AND SECURITY - FOUNDATIONS QUESTIONS WITH COMPLETE SOLUTIONS
[Show more]BUNDLED NETWORK AND SECURITY - FOUNDATIONS QUESTIONS WITH COMPLETE SOLUTIONS
[Show more]1x sold
A.	Describe the network topology that you found when running Nmap. 
 
6 hosts were found using nmap -sn 10.168.27.0/24. The hosts are in a STAR topology as shown in the screenshot below. A star topology means that all hosts are connected to a central device, usually a switch. This makes it easier to...
Preview 2 out of 6 pages
Add to cartA.	Describe the network topology that you found when running Nmap. 
 
6 hosts were found using nmap -sn 10.168.27.0/24. The hosts are in a STAR topology as shown in the screenshot below. A star topology means that all hosts are connected to a central device, usually a switch. This makes it easier to...
TASK 1: NMAP AND WIRESHARK 
 
 
 
 
 
 
 
 
 
 
 
GRP1 TASK 1: NMAP AND WIRESHARK 
Emerging Technologies in Cybersecurity-C844 Western Governors University 
Jennifer Goodchild Student ID # # December 29, 2021 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1 
 
 
 
TASK 1: NMAP AND WIRESHARK 
 
...
Preview 2 out of 11 pages
Add to cartTASK 1: NMAP AND WIRESHARK 
 
 
 
 
 
 
 
 
 
 
 
GRP1 TASK 1: NMAP AND WIRESHARK 
Emerging Technologies in Cybersecurity-C844 Western Governors University 
Jennifer Goodchild Student ID # # December 29, 2021 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1 
 
 
 
TASK 1: NMAP AND WIRESHARK 
 
...
WGU C844 EMERGING TECHNOLOGIES IN CYBERSECURITY 
Performance Assessment GRP-1 Task 2 
 
 
 
 
 
Table of Contents 
A.	Wireless Local Area Network (WLAN) Vulnerabilities.	2 
B.	Mobile Device Vulnerabilities.	2 
C.	Steps for Mitigation.	3 
D.	Preventative Measures.	4 
E.	Recommended Solution for Brin...
Preview 2 out of 9 pages
Add to cartWGU C844 EMERGING TECHNOLOGIES IN CYBERSECURITY 
Performance Assessment GRP-1 Task 2 
 
 
 
 
 
Table of Contents 
A.	Wireless Local Area Network (WLAN) Vulnerabilities.	2 
B.	Mobile Device Vulnerabilities.	2 
C.	Steps for Mitigation.	3 
D.	Preventative Measures.	4 
E.	Recommended Solution for Brin...
Level 1 - Electronic Security Technician 2023/2024 Exam Updated Questions and Verified Complete Solutions. 
 
When a standard is adopted by an agency having authority, the standard becomes a _____ and may contain requirements for alarm installations. 
Code 
Prior to working in a particular jurisdict...
Preview 2 out of 13 pages
Add to cartLevel 1 - Electronic Security Technician 2023/2024 Exam Updated Questions and Verified Complete Solutions. 
 
When a standard is adopted by an agency having authority, the standard becomes a _____ and may contain requirements for alarm installations. 
Code 
Prior to working in a particular jurisdict...
STATE OF TEXAS SECURITY LEVEL II CERTIFICATION EXAM QUESTIONS WITH COMPLETE VERIFIED ANSWERS UPDATED 2024 
 
A security officer has the same authority as a peace officer. TRUE OR FALSE 
False 
A security officer can arrest a suspect for any misdemeanor that has been committed within his view or pres...
Preview 2 out of 8 pages
Add to cartSTATE OF TEXAS SECURITY LEVEL II CERTIFICATION EXAM QUESTIONS WITH COMPLETE VERIFIED ANSWERS UPDATED 2024 
 
A security officer has the same authority as a peace officer. TRUE OR FALSE 
False 
A security officer can arrest a suspect for any misdemeanor that has been committed within his view or pres...
1x sold
WGU D481 – SECURITY FOUNDATIONS QUESTIONS WITH COMPLETE ANSWERS UPDATED 
 
 
1. Compare and contrast the TCP/IP model with the OSI model. How are they different? How are they similar? 
· OSI is more complex 
o Physical, data, network, transport, session, presentation, application 
 
· TCP/IP is ...
Preview 2 out of 10 pages
Add to cartWGU D481 – SECURITY FOUNDATIONS QUESTIONS WITH COMPLETE ANSWERS UPDATED 
 
 
1. Compare and contrast the TCP/IP model with the OSI model. How are they different? How are they similar? 
· OSI is more complex 
o Physical, data, network, transport, session, presentation, application 
 
· TCP/IP is ...
WGU C172 NETWORK AND SECURITY - FOUNDATIONS; PA AND OA SET*** QUESTIONS AND VERIFIED ANSWERS UPDATED 
 
It is a network of users that share computer resources in a limited area. 
LAN 
Local Area Network 
LAN 
How are Local Area Networks defined? 
In terms of protocol and the topology used for access...
Preview 3 out of 20 pages
Add to cartWGU C172 NETWORK AND SECURITY - FOUNDATIONS; PA AND OA SET*** QUESTIONS AND VERIFIED ANSWERS UPDATED 
 
It is a network of users that share computer resources in a limited area. 
LAN 
Local Area Network 
LAN 
How are Local Area Networks defined? 
In terms of protocol and the topology used for access...
SECURITY FOUNDATIONS - D481 – OA EXAM 2024 
 QUESTIONS WITH COMPLETE SOLUTIONS 
 
File Transfer Protocol (FTP) 
20/21 TCP 
Secure Shell (SSH) 
22 TCP 
Telnet 
23 TCP 
SMTP - Simple Mail Transfer Protocol is used to send email over the internet 
25 TCP 
DNS - Domain Name Service is used to resolve ...
Preview 3 out of 20 pages
Add to cartSECURITY FOUNDATIONS - D481 – OA EXAM 2024 
 QUESTIONS WITH COMPLETE SOLUTIONS 
 
File Transfer Protocol (FTP) 
20/21 TCP 
Secure Shell (SSH) 
22 TCP 
Telnet 
23 TCP 
SMTP - Simple Mail Transfer Protocol is used to send email over the internet 
25 TCP 
DNS - Domain Name Service is used to resolve ...
OFFICIAL (ISC)² CISSP - DOMAIN 3: SECURITY ARCHITECTURE AND ENGINEERING QUESTIONS WITH COMPLETE SOLUTIONS 
 
Algorithm 
A mathematical function that is used in the encryption and decryption processes. 
Asymmetric 
Not identical on both sides. In cryptography, 
key pairs are used, one to encrypt, th...
Preview 1 out of 4 pages
Add to cartOFFICIAL (ISC)² CISSP - DOMAIN 3: SECURITY ARCHITECTURE AND ENGINEERING QUESTIONS WITH COMPLETE SOLUTIONS 
 
Algorithm 
A mathematical function that is used in the encryption and decryption processes. 
Asymmetric 
Not identical on both sides. In cryptography, 
key pairs are used, one to encrypt, th...
OFFICIAL (ISC)² CISSP - DOMAIN 1: SECURITY AND RISK MANAGEMENT QUESTIONS WITH COMPLETE SOLUTIONS VERIFIED 
 
Acceptable risk 
A suitable level of risk commensurate with the potential benefits of the organization's operations as determined by senior management. 
Audit/auditing 
The tools, processes...
Preview 1 out of 4 pages
Add to cartOFFICIAL (ISC)² CISSP - DOMAIN 1: SECURITY AND RISK MANAGEMENT QUESTIONS WITH COMPLETE SOLUTIONS VERIFIED 
 
Acceptable risk 
A suitable level of risk commensurate with the potential benefits of the organization's operations as determined by senior management. 
Audit/auditing 
The tools, processes...
D315 - NETWORK AND SECURITY — FOUNDATIONS EXAM QUESTIONS AND VERIFIED ANSWERS 2024 
 
 
Application 
Function: Application software, network applications. 
Anything you can see with your eyeballs like 
web browsers and email. 
Presentation 
Function: Data conversion utilities. Protocol 
Conversion...
Preview 2 out of 6 pages
Add to cartD315 - NETWORK AND SECURITY — FOUNDATIONS EXAM QUESTIONS AND VERIFIED ANSWERS 2024 
 
 
Application 
Function: Application software, network applications. 
Anything you can see with your eyeballs like 
web browsers and email. 
Presentation 
Function: Data conversion utilities. Protocol 
Conversion...
OFFICIAL (ISC)² CISSP - DOMAIN 2: ASSET SECURITY QUESTIONS AND CORRECT VERIFIED ANSWERS 
 
 
Accountability 
Accountability ensures that account management has assurance that only authorized users are accessing the system and using it properly. 
Asset 
An item perceived as having value. 
Asset life...
Preview 1 out of 3 pages
Add to cartOFFICIAL (ISC)² CISSP - DOMAIN 2: ASSET SECURITY QUESTIONS AND CORRECT VERIFIED ANSWERS 
 
 
Accountability 
Accountability ensures that account management has assurance that only authorized users are accessing the system and using it properly. 
Asset 
An item perceived as having value. 
Asset life...
OFFICIAL (ISC)² CISSP - DOMAIN 7: SECURITY OPERATIONS EXAM QUESTIONS WITH COMPLETE SOLUTIONS GRADED A++ 
 
 
Change management 
A formal, methodical, comprehensive process for requesting, reviewing, and approving changes to the baseline of the IT environment. 
Configuration management (CM) 
A forma...
Preview 1 out of 3 pages
Add to cartOFFICIAL (ISC)² CISSP - DOMAIN 7: SECURITY OPERATIONS EXAM QUESTIONS WITH COMPLETE SOLUTIONS GRADED A++ 
 
 
Change management 
A formal, methodical, comprehensive process for requesting, reviewing, and approving changes to the baseline of the IT environment. 
Configuration management (CM) 
A forma...
OFFICIAL (ISC)² CISSP - DOMAIN 4: COMMUNICATION AND NETWORK SECURITY EXAM 2024 QUESTIONS WITH COMPLETE SOLUTIONS VERIFIED 
 
 
 
Address Resolution Protocol (ARP) 
Is used at the Media Access Control (MAC) Layer to provide for direct communication between two devices within the same LAN segment. 
B...
Preview 2 out of 5 pages
Add to cartOFFICIAL (ISC)² CISSP - DOMAIN 4: COMMUNICATION AND NETWORK SECURITY EXAM 2024 QUESTIONS WITH COMPLETE SOLUTIONS VERIFIED 
 
 
 
Address Resolution Protocol (ARP) 
Is used at the Media Access Control (MAC) Layer to provide for direct communication between two devices within the same LAN segment. 
B...
OFFICIAL (ISC)² CISSP - DOMAIN 8: SOFTWARE DEVELOPMENT SECURITY EXAM 2024 QUESTIONS WITH CORRECT VERIFIED SOLUTIONS ALREADY PASSED 
 
ActiveX Data Objects (ADO) 
A Microsoft high-level interface for all kinds of data. 
Capability Maturity Model for Software (CMM or SW-CMM) 
Maturity model focused o...
Preview 1 out of 3 pages
Add to cartOFFICIAL (ISC)² CISSP - DOMAIN 8: SOFTWARE DEVELOPMENT SECURITY EXAM 2024 QUESTIONS WITH CORRECT VERIFIED SOLUTIONS ALREADY PASSED 
 
ActiveX Data Objects (ADO) 
A Microsoft high-level interface for all kinds of data. 
Capability Maturity Model for Software (CMM or SW-CMM) 
Maturity model focused o...
OFFICIAL (ISC)² CISSP - DOMAIN 6: SECURITY ASSESSMENT AND TESTING EXAM QUESTIONS WITH COMPLETE SOLUTIONS VERIFIED 2024 
 
 
Attack surface 
Different security testing methods find different vulnerability types. 
Black-box testing 
Testing where no internal details of the system implementation are u...
Preview 1 out of 3 pages
Add to cartOFFICIAL (ISC)² CISSP - DOMAIN 6: SECURITY ASSESSMENT AND TESTING EXAM QUESTIONS WITH COMPLETE SOLUTIONS VERIFIED 2024 
 
 
Attack surface 
Different security testing methods find different vulnerability types. 
Black-box testing 
Testing where no internal details of the system implementation are u...
NETWORK AND SECURITY - FOUNDATIONS OA PRACTICE QUESTIONS WITH COMPLETE CORRECT ANSWERS GRADED A++ LATEST UPDATED 
 
 
Which type of Ethernet cable can maintain 10Gbps transmission speeds through the course of its maximum 100-meter length? 
CAT 6a 
Which Internet access technology uses ordinary telep...
Preview 2 out of 9 pages
Add to cartNETWORK AND SECURITY - FOUNDATIONS OA PRACTICE QUESTIONS WITH COMPLETE CORRECT ANSWERS GRADED A++ LATEST UPDATED 
 
 
Which type of Ethernet cable can maintain 10Gbps transmission speeds through the course of its maximum 100-meter length? 
CAT 6a 
Which Internet access technology uses ordinary telep...
SECURITY FOUNDATIONS - D481 EXAM QUESTIONS WITH COMPLETE ASNWERS VERIFIED ALREADY PASSED 
 
 
Desktop computers are connected to the building backbone in the wiring closet. What is another name for this wiring closet? 
Intermediate distribution frame (IDF) 
802.3-1983 
10Base5 
802.3a-1985 
10Base2 ...
Preview 2 out of 10 pages
Add to cartSECURITY FOUNDATIONS - D481 EXAM QUESTIONS WITH COMPLETE ASNWERS VERIFIED ALREADY PASSED 
 
 
Desktop computers are connected to the building backbone in the wiring closet. What is another name for this wiring closet? 
Intermediate distribution frame (IDF) 
802.3-1983 
10Base5 
802.3a-1985 
10Base2 ...
SECURITY FOUNDATIONS - D481 EXAM 2024 LATEST QUESTIONS AND VERIFIED ANSWERS GRADED A++ 
 
 
A set of protocols made up of four layers (Application, Transport, Network, Network Interface Layer) used to connect network devices to each other 
TCP/IP (Transmission Control Protocol/Internet Protocol) 
TC...
Preview 3 out of 19 pages
Add to cartSECURITY FOUNDATIONS - D481 EXAM 2024 LATEST QUESTIONS AND VERIFIED ANSWERS GRADED A++ 
 
 
A set of protocols made up of four layers (Application, Transport, Network, Network Interface Layer) used to connect network devices to each other 
TCP/IP (Transmission Control Protocol/Internet Protocol) 
TC...
SECURITY FOUNDATIONS D481 TEST QUESTIONS AND COMPLETE VERIFIED ANSWERS UPDATED 
 
If your internet goes down the port you would want to check is 
Port 53 DNS 
What are the 6 components of a structured wiring system? 
1. Building Cabling entrance 
2. Data Center/Equipment room 
3. Backbone cabling 
4...
Preview 2 out of 11 pages
Add to cartSECURITY FOUNDATIONS D481 TEST QUESTIONS AND COMPLETE VERIFIED ANSWERS UPDATED 
 
If your internet goes down the port you would want to check is 
Port 53 DNS 
What are the 6 components of a structured wiring system? 
1. Building Cabling entrance 
2. Data Center/Equipment room 
3. Backbone cabling 
4...
D481 – SECURITY FOUNDATIONS EXAM QUESTIONS AND COMPLETE SOLUTIONS WITH CORRECT ANSWERS GRADED A++ 
 
1. Compare and contrast the TCP/IP model with the OSI model. How are they different? How are they similar? 
· OSI is more complex 
o Physical, data, network, transport, session, presentation, appl...
Preview 2 out of 10 pages
Add to cartD481 – SECURITY FOUNDATIONS EXAM QUESTIONS AND COMPLETE SOLUTIONS WITH CORRECT ANSWERS GRADED A++ 
 
1. Compare and contrast the TCP/IP model with the OSI model. How are they different? How are they similar? 
· OSI is more complex 
o Physical, data, network, transport, session, presentation, appl...
D481 SECURITY FOUNDATIONS - D481 EXAM ACTUAL QUESTIONS AND VERIFIED ANSWERS 2024 
 
Port number and Protocol for File Transfer Protocol (FTP) / FTP command 
Port 20/21, TCP 
Port number and Protocol for SSH / Secure File Transfer Protocol (SFTP) 
Port 22, TCP 
Port number and Protocol for Telnet 
Po...
Preview 1 out of 3 pages
Add to cartD481 SECURITY FOUNDATIONS - D481 EXAM ACTUAL QUESTIONS AND VERIFIED ANSWERS 2024 
 
Port number and Protocol for File Transfer Protocol (FTP) / FTP command 
Port 20/21, TCP 
Port number and Protocol for SSH / Secure File Transfer Protocol (SFTP) 
Port 22, TCP 
Port number and Protocol for Telnet 
Po...
D481 SECURITY FOUNDATIONS EXAM QUESTIONS WITH COMPLETE SOLUTIONS VERIFIED BY EXPERT 
 
 
What are the layers of the OSI model? 
7. Application 
6. Presentation 
5. Session 
4. Transport 
3. Network 
2. Data Link 
1. Physical 
What are the layers of the TCP/IP Reference Model? 
Application 
Transport...
Preview 2 out of 15 pages
Add to cartD481 SECURITY FOUNDATIONS EXAM QUESTIONS WITH COMPLETE SOLUTIONS VERIFIED BY EXPERT 
 
 
What are the layers of the OSI model? 
7. Application 
6. Presentation 
5. Session 
4. Transport 
3. Network 
2. Data Link 
1. Physical 
What are the layers of the TCP/IP Reference Model? 
Application 
Transport...
D481 SECURITY FOUNDATIONS EXAM QUESTIONS AND VERIFIED ANSWERS APPROVED BY EXPERT FOR 100% GUARANTEED PASS 
 
 
Early implementations of Ethernet used coaxial cable. 
A. True 
B.False 
True 
What was the original transmission speed of Ethernet under the 802.3 standard? 
A. 2.94 Mbps 
B. 4.77 Mbps 
C....
Preview 2 out of 8 pages
Add to cartD481 SECURITY FOUNDATIONS EXAM QUESTIONS AND VERIFIED ANSWERS APPROVED BY EXPERT FOR 100% GUARANTEED PASS 
 
 
Early implementations of Ethernet used coaxial cable. 
A. True 
B.False 
True 
What was the original transmission speed of Ethernet under the 802.3 standard? 
A. 2.94 Mbps 
B. 4.77 Mbps 
C....
D481 - SECURITY FOUNDATIONS ESSENTIAL TERMINOLOGY EXAM QUESTIONS WITH VERIFIED ANSWERS UPDATED 
 
 
Network interface controller (NIC) 
A hardware device that connects a computer or other device to network media. 
Address resolution 
The process of finding an IP address for a host name 
Broadcast ad...
Preview 3 out of 21 pages
Add to cartD481 - SECURITY FOUNDATIONS ESSENTIAL TERMINOLOGY EXAM QUESTIONS WITH VERIFIED ANSWERS UPDATED 
 
 
Network interface controller (NIC) 
A hardware device that connects a computer or other device to network media. 
Address resolution 
The process of finding an IP address for a host name 
Broadcast ad...
WGU D315 NETWORK AND SECURITY - FOUNDATIONS OBJECTIVE ASSESSMENT PRE STUDY 2024/2025/GRADED A+ 
 
 
TCP/IP 
model that is a common set of protocol standards that permits the appropriate transmission of data; used for practical application when locating specific protocol 
TCP/IP layers 
application, ...
Preview 3 out of 28 pages
Add to cartWGU D315 NETWORK AND SECURITY - FOUNDATIONS OBJECTIVE ASSESSMENT PRE STUDY 2024/2025/GRADED A+ 
 
 
TCP/IP 
model that is a common set of protocol standards that permits the appropriate transmission of data; used for practical application when locating specific protocol 
TCP/IP layers 
application, ...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller NurseAdvocate. Stuvia facilitates payment to the seller.
No, you only buy these notes for $50.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
73918 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now