100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU - MSCSIA - C700 - Secure Network Design - 2019 - Practice Test | 379 Questions with 100% Correct Answers $12.49   Add to cart

Exam (elaborations)

WGU - MSCSIA - C700 - Secure Network Design - 2019 - Practice Test | 379 Questions with 100% Correct Answers

 12 views  0 purchase
  • Course
  • Institution

What is another term for a demilitarized zone (DMZ)? Correct Answer: Screened subnet is another term for a demilitarized zone (DMZ). Two firewalls are used in this configuration: one firewall resides between the public network and DMZ, and the other resides between the DMZ and private network. ...

[Show more]

Preview 3 out of 25  pages

  • October 19, 2022
  • 25
  • 2022/2023
  • Exam (elaborations)
  • Questions & answers
avatar-seller
WGU - MSCSIA - C700 - Secure Network Design - 2019 - Practice
Test | 379 Questions with 100% Correct Answers
What is another term for a demilitarized zone (DMZ)? Correct Answer: Screened subnet is
another term for a demilitarized zone (DMZ). Two firewalls are used in this configuration: one
firewall resides between the public network and DMZ, and the other resides between the DMZ
and private network.

Screened subnet Correct Answer: is another term for a demilitarized zone (DMZ). Two firewalls
are used in this configuration: one firewall resides between the public network and DMZ, and the
other resides between the DMZ and private network.

A screened host is Correct Answer: a firewall that resides between the router that connects a
network to the Internet and the private network. The router acts as a screening device, and the
firewall is the screen host. This firewall employs two network cards and a single screening
router.

A dual-homed firewall is Correct Answer: one that has two network interfaces: one interface
connects to the Internet, and the other connects to the private network. One of the most common
drawbacks to dual-homed firewalls is that internal routing may accidentally become enabled.

APIPA Correct Answer: ?

Infrastructure mode Correct Answer: allows wireless computers to connect to a LAN, a WAN,
or the Internet.

This means that infrastructure mode wireless computers can access all computers on the LAN,
WAN, and Internet.

Infrastructure mode is much more expensive to implement than ad hoc mode because you must
configure wireless access points.

While infrastructure mode is harder to set up and configure, it is much easier to manage than ad
hoc mode.

Ad hoc mode Correct Answer: allows wireless computers to be configured much more quickly
than infrastructure mode.

computers all participate in the same network.

This means that the
wireless computers can access each other, but cannot access network resources on a LAN, WAN,
or Internet.

is much cheaper than infrastructure mode to implement.

,In addition, it is easy to set up and configure and can provide better performance than
infrastructure mode.

However, it is difficult to manage.

Static IP addresses should not be implemented because the corporate network contains a DHCP
server. Correct Answer: static IP

APIPA should not be used for the same reason. In addition, APIPA is utilized only if a DHCP
server is not found. Correct Answer: APIPA

The Ethernet LAN technology does NOT use a multistation access unit (MAU) as its central
device Correct Answer: The Ethernet LAN technology does NOT use a multistation access unit
(MAU) as its central device

Multi-station Access Unit (MAU) Correct Answer: Central device in a Token Ring network
which passes the Token from device to device serially in order and in a one-way direction.

Token Ring supports Correct Answer: full duplex transmission using carrier sense multiple
access with collision avoidance (CSMA/CA).

Ethernet LAN technology Correct Answer: supports full duplex transmissions.

It uses carrier sense multiple access with collision detection (CSMA/CD).

It is defined by IEEE 802.3

Full-duplex can Correct Answer: transmit and receive information in both directions
simultaneously.

synchronous transmission has Correct Answer: a start bit is used to indicate the beginning of
transmission.

The start bit is followed by data bits, and then one or two stop bits follow to indicate the end of
the transmission.

In synchronous transmission, Correct Answer: the transmitter and receiver have synchronized
clocks and the data is sent in a continuous stream.

The clocks are synchronized by using transitions in the data and, therefore, start and stop bits are
not required for each unit of data sent

Half-duplex transmissions are Correct Answer: transmissions in which information can be
transmitted in two directions, but only one direction at a time.

, You should complete all of the following steps to protect against war-driving attacks: Correct
Answer: 1. Change the default SSID.
2. Disable SSID broadcasts.
3. Configure the network to use
authenticated access only.f
4. Implement Wi-Fi Protected Access (WPA) or WPA2 instead of WEP.
5. Reduce the access point signal strength.

NetStumbler is a Correct Answer: common war-driving tool.

To idenfity unauthorized wireless access points you should Correct Answer: periodically
complete a site survey

The reason you would disable SSID broadcasts is to Correct Answer: protect a wireless network
from hackers and to prevent unauthorized site surveys.

WEP - Uses a X-bit or X-bit key Correct Answer: 40bit or 104 bit

WPA/WPA2 Personal - Uses a x-bit key Correct Answer: 256-bit pre-shared key

WPA/WPA2 Enterprise - Requires a Correct Answer: RADIUS server

Dictionary attack - occurs when a Correct Answer: hacker tries to guess passwords using a list
of common words

DoS attack - occurs when a Correct Answer: server or resource is overloaded so that legitimate
users cannot access it

Pharming attack - occurs when Correct Answer: traffic is redirected to a site that looks identical
to the intended site

Phishing attack - occurs when Correct Answer: confidential information is requested by an
entity that appears to be legitimate

WEP/WPA cracking - Correct Answer: Mathematical algorithms are used to determine the pre-
shared key used on the access point.

Warchalking - Correct Answer: SSID and other authentication details regarding a wireless
network are written down in a prominent public place.

Evil twin - Correct Answer: A rogue access point is configured with the same SSID as a valid
access point.

A bastion host is a computer that Correct Answer: resides on a network that is locked down to
provide maximum security.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75619 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.49
  • (0)
  Add to cart