100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D315 Network & Security Foundations Practice Test 64 Questions with Verified Answers,100% CORRECT $12.99   Add to cart

Exam (elaborations)

WGU D315 Network & Security Foundations Practice Test 64 Questions with Verified Answers,100% CORRECT

 0 view  0 purchase
  • Course
  • WGU D315 Network & Security Foundations
  • Institution
  • WGU D315 Network & Security Foundations

WGU D315 Network & Security Foundations Practice Test 64 Questions with Verified Answers

Preview 2 out of 7  pages

  • October 13, 2024
  • 7
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU D315 Network & Security Foundations
  • WGU D315 Network & Security Foundations
avatar-seller
paulhans
WGU D315 Network & Security Foundations Practice Test 64
Questions with Verified Answers
Which of the following describes a private cloud? - CORRECT ANSWER Provides
cloud services to a single organization

Cynthia is working on her Western Governors University application online, when
the admissions website crashes. She is unable to turn in her application on time.
What part of the CIA Triad is affected? - CORRECT ANSWER Availability

Which layer of the OSI model is responsible for the establishment, maintaining
and terminating the connection between two systems? - CORRECT ANSWER
Session

Which of the following describes a man-in-the-middle attack? - CORRECT ANSWER
A false server intercepts communications from a client by impersonating the
intended server.

With regards to AAA, _______ confirms that the user is how he or she claims to
be. - CORRECT ANSWER Authentication

A company is concerned with traffic that flows through the network. There is a
concern that there may be malware that exists that is not being blocked or
eradicated by antivirus. What technology can be put in place to detect potential
malware traffic on the network? - CORRECT ANSWER IDS

Nancy is responsible for the administration of many different servers in her
company. Which one of the following commands can she use to gain command-
line administrative access to her Linux servers in a secure manner? - CORRECT
ANSWER SSH

A wireless deauthentication attack is an example of which type of attack: -
CORRECT ANSWER Denial of service attack

, Barry is working with his organization's platforms team to select a virtualization
approach for use in their data center. To provide stronger security, he would like
to select a hypervisor that runs directly on bare metal hardware without an
intervening host operating system. What type of hypervisor should he choose? -
CORRECT ANSWER Type 1

Which of the following geographic network types are typically contained within
city or county limits? - CORRECT ANSWER Metropolitan Area Network (MAN)

You have implemented a network where each device provides all other devices on
the network with access to shared files. What type of network do you have? -
CORRECT ANSWER Peer-to-Peer

You were recently hired by a small start-up company. The company has no plans
to setup their own datacenter. You have been asked to find a cloud service that
would provide several physical servers or virtual machines that the company
would be able to install whatever operating systems and applications they need.
Which cloud service model should you use? - CORRECT ANSWER IaaS

Which of the following hardware devices forwards a signal out all connected ports
without examining the frame or packet contents? - CORRECT ANSWER Hub or
Repeater

Tom would like to determine what network ports are open on a newly
commissioned server. Which one of the following tools is best suited for that
task? - CORRECT ANSWER Nmap

Which of the following cloud computing solutions will deliver software
applications to a client either over the internet or on a local area network? -
CORRECT ANSWER SaaS

What encryption algorithm uses the same pre-shared key to encrypt and decrypt
data? - CORRECT ANSWER Symmetric

Which network is this? I allow computers to communicate with each other in the
same building - CORRECT ANSWER LAN

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller paulhans. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76800 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99
  • (0)
  Add to cart