WGU D315 Network and Security Foundation Exam 232
Questions with Verified Answers
Which OSI layer is related to the IP protocol - CORRECT ANSWER Network 3
Which OSI layer is organizing the bits over the physical layer between devices in
the same collision domain? - CORRECT ANSWER Data Link 2 - They are in the same
Frame
Which OSI layer is a Switch at? - CORRECT ANSWER Data Link 2
Which OSI layer is a WAP (Wireless Access Point) at? - CORRECT ANSWER Data
Link 2
Which OSI layer is a router at - CORRECT ANSWER Network (3)
TCP protocol is on what OSI layer - CORRECT ANSWER Transport (4)
OSI layer 4 - CORRECT ANSWER Transport Layer (TCP, end to end connection)
OSI Layer 5 - CORRECT ANSWER Session Layer (API, Sockets, Synch and send to
port)
OSI layer 6 - CORRECT ANSWER Presentation layer (Syntax and encryption layer,
SSL, SSH, JPEG)
OSI layer 7 - CORRECT ANSWER Application layer (end user layer, http,
applications)
,Network Typology point to point - CORRECT ANSWER Two devices connect
directly
Network Typology bus - CORRECT ANSWER All devices connect to a central main
line
Network Typology Ring - CORRECT ANSWER All devices have two connections and
form an endless ring
Network Typology Star - CORRECT ANSWER All devices connect to a central point
Network Typology Tree - CORRECT ANSWER Multiple devices connect together
(on a switch) and then the switches are connected with each other
Network Typology Mesh - CORRECT ANSWER All devices connect directly to each
other
Network Typology Hybrid - CORRECT ANSWER Multiple Network Typology within
the network
Cloud - where do I manage the OS Iaas or Paas? - CORRECT ANSWER Iaas
What do I manage on Paas (2) - CORRECT ANSWER Application and Data
Name the 3 CIA triades - CORRECT ANSWER Integrity, Availability and
Confidentiality
What is the CIA Triade Integrity? - CORRECT ANSWER Detects alteration in
storage, transit and process
What is the CIA Triade Availability? - CORRECT ANSWER Ensure Authorized
Access, Performance and Backup
Keeping unauthorized users out is not in this triade.
What is the CIA Triade Confidentiality? - CORRECT ANSWER Protect from
unauthorized access and use, protecting data access in storage, transit and
process
,100m long Cat 5 cable supports speeds up to - CORRECT ANSWER 100 Mb/s
100m long Cat 5e cable supports speeds up to - CORRECT ANSWER 1000 Mb/s or
1 Gb/s
100m long Cat 6 cable supports speeds up to - CORRECT ANSWER 10 Gb/s
100m long Cat 6a cable supports speeds up to - CORRECT ANSWER 10 Gb/s
Does a firewall provide two way protection? - CORRECT ANSWER Yes, it protects
ingress and egress data
Firewall that only checks the address label - CORRECT ANSWER Packet Filter
On what OSI level is a Packet Filter operating - CORRECT ANSWER Transport
(checks TCP/UDP prot numbers) and Network (checks source and destination IP)
What is a circuit level gateway - CORRECT ANSWER A firewall that conceals the
true identity of the protected network (hides IP) on the transport (4) layer
What does state in stateful mean? - CORRECT ANSWER It refers to the connection
state between two computers
Why do we need the 5th layer on a Stateful Inspection - CORRECT ANSWER In this
connection, the firewall is creating temporary rules per session to permit
communication (TCP) back to the sender.
What is a stateful inspection - CORRECT ANSWER It reduces the amount of
firewall rules. Firewall vendors implemented a feature that only needs one rule to
allow the initial communication.
How do we protect the application level with a firewall - CORRECT ANSWER With
a proxy server, Middle man or Layer 7 firewall
Can a packet filter firewall scan the packet content? - CORRECT ANSWER No, a
layer 7 or proxy is needed
, What is a IDS - CORRECT ANSWER Intrusion Detection system. A system for
detecting attempting intrusion. Related to intrusion prevention systems (IPS) that
block suspected attacks
What is IPS - CORRECT ANSWER Intrusion Prevention System that can block traffic
if a malicious anomaly is detected
Cyber Attack - Ransomware - CORRECT ANSWER Encrypts data. Attacker sells the
key. Prevent with Virus scanner
Cyber Attack - Man in the Middle - CORRECT ANSWER Eaves dropping. The data
flows thru the middle man. The attacker can stop/change the data
Cyber Attack - Zero Day exploit - CORRECT ANSWER New unheard vulnerability.
Needs to be patched
Cyber Attack - DNS tunneling - CORRECT ANSWER An attacker creates a bad server
and connects it to the attacked domain name system. If now a request comes to
the attacked server, the attacker can tunnel into the client and since dns
connections are rarely monitored, the attacker stays hidden.
Cyber Attack - XXS attack - CORRECT ANSWER Cross Site Scripting uses a web form
to inject malicious code.
Cyber Attack - Social engineering - CORRECT ANSWER Convince someone to give a
you access to sensitive information
Cyber Attack - DoS and DDos - CORRECT ANSWER Denial of Service attacks flood a
server with too much traffic
Cyber Attack - SQL Injection - CORRECT ANSWER A technique to add a string of sql
code to a query to gain access to the targeted database
Cyber Attack - ARP Poisoning / ARP Spoofing - CORRECT ANSWER LAN attack that
sends malicious Address Resolution Protocol packets to a default gateway in
order to change the IP to MAC pairings
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller paulhans. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $17.49. You're not tied to anything after your purchase.