100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
D315 WGU || with Complete Solutions. $11.29   Add to cart

Exam (elaborations)

D315 WGU || with Complete Solutions.

 3 views  0 purchase
  • Course
  • D315 WGU ||
  • Institution
  • D315 WGU ||

Network devices correct answers Switches, routers, and firewalls with access to data Compromised device correct answers Device accessed by a malicious user or attacker Wireless networks correct answers Networks vulnerable to attackers in close proximity Hardening correct answers Process of...

[Show more]

Preview 2 out of 10  pages

  • August 28, 2024
  • 10
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • D315 WGU ||
  • D315 WGU ||
avatar-seller
FullyFocus
D315 WGU || with Complete Solutions.
Network devices correct answers Switches, routers, and firewalls with access to data

Compromised device correct answers Device accessed by a malicious user or attacker

Wireless networks correct answers Networks vulnerable to attackers in close proximity

Hardening correct answers Process of securing and testing network devices

Default passwords correct answers Factory-set passwords that should be changed

Unnecessary logins correct answers Accounts not used by the network administrator

Strong password policy correct answers Requiring complex passwords and regular changes

Unnecessary services correct answers Optional features that increase the risk of attack

Patching correct answers Installing security updates to fix vulnerabilities

Physical access correct answers Ability to physically interact with a device

Trusted network correct answers Network authorized to make changes to a device

Wireless network encryption correct answers Configuring WPA2 or WPA3 for secure traffic

Audit logs correct answers Records of device activity for analysis and detection

Backup correct answers Creating copies of device configurations for restoration

Authentication correct answers Process of confirming a person's identity

Microsoft Active Directory correct answers Authentication system that confirms user identity via
passwords

Public Key Infrastructure (PKI) correct answers Authentication system that uses certificates to
validate website identity

Authorization correct answers Determines what a user may access after authentication

Restrictive Permissions correct answers Applying limited access to data and securing servers and
network devices

Data Leaks correct answers Risk of unauthorized access to confidential data

, Malware Infection correct answers Accidental infection of network data files by a user's infected
computer

AAA Interaction correct answers Client communication with a radius server via the cloud

Accounting correct answers Process of verifying access control settings and providing a forensic
trail

Immutable Logs correct answers Audit logs stored in an unchangeable form to prevent tampering

MFA correct answers Multi-factor authentication, an optional add-on to the authentication
process

2FA correct answers Another term for multi-factor authentication

PIN correct answers Personal Identification Number used as part of multi-factor authentication

Biometric Scan correct answers Facial, retinal, or fingerprint scan used for multi-factor
authentication

Touch ID correct answers Fingerprint scan used for authentication on Apple devices

Face ID correct answers Facial recognition scan used for authentication on Apple devices

Proximity-based Security correct answers Automatic unlocking of devices when in close range

Windows Hello correct answers Mechanism on Microsoft Windows computers using fingerprint
or facial recognition

Wireless network attacks correct answers Attacks on wireless networks that can be done
remotely

Denial of Service (DoS) attack correct answers An attack that enables unauthorized access and
traffic monitoring of a wireless network

Deauth attack correct answers A denial-of-service (DoS) attack where the attacker can force
clients off a network

WPA3 security correct answers A security protocol that encrypts management packets in a
wireless network

WPA2 security correct answers A security protocol that encrypts data traffic in a wireless
network

Fake Access attack correct answers An attack where an attacker sets up an illegitimate wireless
network to intercept data

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.29. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75391 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.29
  • (0)
  Add to cart