100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU - MSCSIA - C700 - Secure Network Design – 2024 Updated Questions Bank With 100% Solved Solutions!! $12.99   Add to cart

Exam (elaborations)

WGU - MSCSIA - C700 - Secure Network Design – 2024 Updated Questions Bank With 100% Solved Solutions!!

 1 view  0 purchase
  • Course
  • ...
  • Institution
  • ...

WGU - MSCSIA - C700 - Secure Network Design – 2024 Updated Questions Bank With 100% Solved Solutions!!

Preview 4 out of 40  pages

  • October 13, 2024
  • 40
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ...
  • ...
avatar-seller
legitnurse
Name: Score:


76 Multiple choice questions

Term 1 of 76
A company's chief executive officer (CEO) is traveling overseas for a business meeting and wants
to protect emails and video conference calls from a breach in confidentiality.


Which strategy should be used to achieve this objective?

Intrusion Detection System (IDS)


Site-to-site VPN

Intrusion detection system (IDS)
Dynamic filtering

Secure a VPN back into the corporate offices.

Term 2 of 76
A laptop has been stolen, and the data has been seen for sale on the darknet.


Which process could have protected the confidentiality of the data?

The employee's public key


Application firewall

Hard drive encryption


Cross-site scripting

,Term 3 of 76
An information security project manager has been tasked with implementing a new system
designed to detect and respond to network security threats to user workstations as well as
systems in a screened subnet. As part of the configuration, the project team will implement a new
network topology.


Which network topoly should the project team implement?

Intrusion detection system (IDS)
Dynamic filtering


Intrusion Detection System (IDS)


Acceptable use policy
Training


Intrusion prevention system (IPS) along with sensors in the demilitarized zone (DMZ) and
local area network (LAN)

Term 4 of 76
A company is concerned about employee usernames and passwords being obtained through
phishing campaigns.


Which emerging technology should the company employ to keep this from happening?

It will filter based solely on initial session setup.

Script kiddies

Tokens


Secure Sockets Layer/Transport Layer Security (SSL/TLS)

,Term 5 of 76
An application server was recently attacked, resulting in compromise of all transactional credit
card information via the website. It was revealed that the attacker was able to compromise a
system administrator's computer via a spear phishing attack. This gave the attacker the ability to
compromise the application server.


Which network security management practice should be applied to treat these operational
weaknesses?

A vulnerability


Increase training of information technology staff on the dangers of social engineering.

Intrusion prevention system (IPS) along with sensors in the demilitarized zone (DMZ) and
local area network (LAN)

Intrusion detection system (IDS)
Dynamic filtering

Term 6 of 76
Recently, many organizations are embracing Bring Your Own Device (BYOD) as a means to
reduce cost.


What is the primary reason these organizations must ensure malware detection remains a top
priority?

A vulnerability

To protect the organization from attacks introduced by the lack of a perimeter

Internet Protocol Version 6 (IPv6)

Application firewall

, Term 7 of 76
In the diagram provided, three network zones containing servers are depicted. As the security
architect, only one host intrusion sensor and one network intrusion sensor will be allowed in the
design.


Where should the sensors be deployed to maximize detection of threats against this
organization's extranet implementation?

HIDS on the web server and NIPS in the DMZ

Bastion firewall acting as the firewall and a VPN


Vulnerability assessments
Patch management

Contain and unplug this device from the network.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller legitnurse. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

85651 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99
  • (0)
  Add to cart