100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D315 Network and Security Foundations Exam 417 Questions with Verified Answers,100% CORRECT $18.49   Add to cart

Exam (elaborations)

WGU D315 Network and Security Foundations Exam 417 Questions with Verified Answers,100% CORRECT

 1 view  0 purchase
  • Course
  • WGU D315 Network and Security Foundations
  • Institution
  • WGU D315 Network And Security Foundations

WGU D315 Network and Security Foundations Exam 417 Questions with Verified Answers

Preview 4 out of 43  pages

  • October 13, 2024
  • 43
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU D315 Network and Security Foundations
  • WGU D315 Network and Security Foundations
avatar-seller
paulhans
WGU D315 Network and Security Foundations Exam 417
Questions with Verified Answers

Network - CORRECT ANSWER A chain of communication that connects places.
NOT THE INTERNET. Your home is its own ____

Hub - CORRECT ANSWER Dumb, doesn't think, sits at physical layer of OSI model,
Connects router to the network, sends data packets to ALL connected devices.

Switch - CORRECT ANSWER Used to connect devices in a specific networks, Builds
a MAC address tables and sends accordingly. Is a more complex version of a Hub.
Forwards data packets. Sits at Data Link Layer of the OSI model.

Router - CORRECT ANSWER is a point of connection between two or more
networks. Connects to other IP's. Forwards data packets between networks. Sits
at network layer of the OSI model.

Access Point - CORRECT ANSWER Used to interconnect wireless devices and
provide a connection to the wired LAN. Different than wireless router. Sits at data
link layer of OSI model.

Protocol - CORRECT ANSWER Set of rules established for users to gain control of
the network to exchange information.

Topology - CORRECT ANSWER Is the network architecture used to interconnect
the networking equipment.

3 common network topologies - CORRECT ANSWER Star Network, Ring Network,
and Bus network are common what?

Bus Topology - CORRECT ANSWER Old, used when the internet wasn't around,
uses a cable/backbone/Datalink which is terminated on either end. Data packets

,travel with electric signals in 1 direction, called half duplex. Basically first come
first serve, easy to setup, doesn't cost alot.

Token Ring or Ring Topology - CORRECT ANSWER Was created to overcome 1st
come first serve of bus topology. Uncommon, setup for specific reasons, each
device passes a token at a certain time. Continuous path, loop, or ring.

Star Topology - CORRECT ANSWER Not actually in a star, Could be cat cables to a
patch panel in an office connected to a server room with a switch. All network
devices are connected to hub or switch. The network devices do not share data
connections to/from the hub or switch. A hub broadcasts all data traffic to all
networking devices connected to its data ports. One downside is single point of
failure if hub/switch breaks.

Mesh topology - CORRECT ANSWER Overcomes star topology single point of
failure. These are complicated and expensive. The world wide web or internet is
an example of this. Has redundant data paths. All network devices are heavily
interconnected. Can b e called Hub and Spoke.

Physical address - CORRECT ANSWER Another term for MAC address

logical address - CORRECT ANSWER another term for IP address

Layers of OSI Model - CORRECT ANSWER Layer 1 - Physical
Layer 2 - Data Link
Layer 3 - Network
Layer 4 - Transport
Layer 5 - Session
Layer 6 - Presentation
Layer 7 - Application
(All People Seem To Need Dominoes Pizza)

Layers of the TCP/IP Model - CORRECT ANSWER Application, transport,Network,
and network interface

TCP/IP (Transmission Control Protocol/Internet Protocol) Model - CORRECT
ANSWER Used to connect network devices

,OSI Model - CORRECT ANSWER A Framework for networking that ensures
compatibility in the network hardware and software. Helps with development of
new networking technologies (All People Seem To Need Dominoes Pizza)

HyperVisor - CORRECT ANSWER Software that enables a single computer to run
multiple operating systems simultaneously.

Type 1 hypervisor/Bare Metal Hypervisor - CORRECT ANSWER is loaded directly
onto the hardware, and commonly used on server.

Type 2 hypervisor/Hosted Hypervisor - CORRECT ANSWER Loaded on the
operating system, and commonly used on personal computers.

Typical Cloud Service models - CORRECT ANSWER IaaS (infrastructure as a service)
PaaS (Platform as a Service)
SaaS (Software as a Service)

IaaS (Infrastructure as a Service) - CORRECT ANSWER A physical server without OS
or anything on it. The renter chooses and setups EVERYTHING. The renter is
responsible for it all past just the server.

PaaS (Platform as a Service) - CORRECT ANSWER A service that focuses on
application development on any desired platform. They take care of OS and
Server. Renter is responsible for sending them their data and website to host on
their application. A testing location for a mobile app, (Its like you're renting a
house and need to furnish it but the landlord is responsible for repairs)

SaaS (Software as a Service) - CORRECT ANSWER Application delivery. All the
renter is involved with is making sure you can download the app.

Public Cloud - CORRECT ANSWER Cloud infrastructure is owned and operated by
cloud service company but made available for general public use. (NOT FREE,
think purchasing amazon AWS. You may still have to pay fee to access)

Private Cloud - CORRECT ANSWER Operated by the organization and made
available only to members of the organization. (DoD cloud example)

, Community Cloud - CORRECT ANSWER Two or more organizations that have
access to infrastructure.

Hybrid Cloud - CORRECT ANSWER A combination of a private and public, has at
least one private and one public cloud

BYOD (bring your own device) policy - CORRECT ANSWER a statement concerning
employees' permissions and responsibilities when they use their own device for
organizational business. (actually taking your device to work and using work stuff
on them) Saves money but risk of attacks

Mobile Device Management (MDM) - CORRECT ANSWER remotely controls smart
phones and tablets, ensuring data security. (Mainly for BYOD)

Advance Persistent Threat (APT) - CORRECT ANSWER A threat lies dormant
waiting to trigger at a preordained time. utilized in ransomware attacks so that
back ups are affected too.

Zero-Day - CORRECT ANSWER Attack against a vulnerability that is unknown to
the original developer or manufacturer or public. (IPS can be used to try to stop
attacks by monitoring)

Vulnerability Testers - CORRECT ANSWER Scans servers and network devices for
known vulnerabilities. (Typically good guys but sometimes bad guys use the same
thing)

Blue, Red, White, and Purple Teams - CORRECT ANSWER Red team attempts to
compromise security
Blue team defends
White team observers (Referees)
Purple team involves continuous improvement (When blue an red team engage,
debrief, and cross-train)

white hat hackers - CORRECT ANSWER work at the request of the system owners
to find system vulnerabilities and plug the holes. (Red team works for the
company, This ethical hacker doesn't)

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller paulhans. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $18.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76800 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$18.49
  • (0)
  Add to cart