WGU C172 Network & Security Actual preparation test exam with Thorough and Correct answers Updated 2024/2025
1 view 0 purchase
Course
WGU C172 Network & Security
Institution
WGU C172 Network & Security
WGU C172 Network & Security Actual preparation test exam with Thorough and Correct answers Updated 2024/2025
Viruses - correct answer Attaches itself to a file or host. (Many types!)
Worms - correct answer Do not attach to a host file, they are self-contained programs.
Trojans - correct an...
WGU C172 Network & Security Actual
preparation test exam with Thorough and
Correct answers Updated 2024/2025
Viruses - correct answer Attaches itself to a file or host. (Many types!)
Worms - correct answer Do not attach to a host file, they are self-contained programs.
Trojans - correct answer Hides in a useful program.
Rootkits - correct answer Malware hidden in a host's file system, quite hard to detect.
Ransomware - correct answer Blocks victim's data—threatens to publish it or delete it
unless a ransom is paid.
Adware - correct answer Advertising banners. Can automatically be downloaded on
computers.
Zero day - correct answer Exploits a vulnerability in the OS software—requires a patch
to be remedied.
CIA Triad - correct answer Confidentiality: the access to information should be granted
only on a need-to-know basis, Integrity: the information should not be tampered with
from source to destination., Availability: The services of an organization should be
available.
AAA - correct answer Authentication: Who and what are you? (First step.),
Authorization: What are you allowed to do? (Second step.), Accounting: Keeps track of
what you do. (Final step.)
, Packet Filtering Firewall - correct answer A limit is placed on the packets that can enter
the network. Compares traffic against pre-established criteria. Explicit ports must be
opened to allow incoming and outgoing traffic Packet filtering can also limit information
moving from one segment to another. Looks at data headers. >>Operates at Layer 3
(the IP Layer) and Layer 4 ( the TCP and UDP port numbers)
Stateful Inspection Firewall - correct answer EVERY packet is analyzed, categorized
and a security decision is made. The inbound and outbound data packets are compared
to determine if a connection should be allowed. This includes tracking the source and
destination port numbers and sequence numbers as well as the source and destination
IP addresses. Automatically creates rules to permit traffic based on communication type.
Needs 1 rule to establish a session. Looks at data headers. >>Operates at Layers 3, 4,
5.
Stateless Firewall - correct answer Does NOT keep track of traffic flows (no sessions).
Needs 2 rules (one to reach destination port, another to allow traffic to come back).
Traffic sent outside an active session will be stateless.
Proxy Server - correct answer Some firewalls are configured as proxies. You make a
request to the firewall then the firewall makes its own request on your behalf to the
internet. It then examines the response that it gets back for malware/danger and sends
it to you if its safe. The client gets access to the network via the proxy server. This step
is used to authenticate the user, establish the session, and set policies. The client must
connect to the proxy server to connect to resources outside the network. Hides your IP
address. Looks at actual data inside packets.
Application Level Firewall (sometimes known as a proxy firewall) - correct answer
Blocks program-level traffic. Analyzes packet content. Modern firewalls are application-
aware. They operate at Layer 7 (Application). Called application layer gateway, stateful
multilayer inspection, deep packet inspection or next-gen. For example, you might be
able to view Twitter but not post to Twitter because the application (stateful) firewall
knows exactly what you should be allowed to do. Requires decode of the packets.
Looks at actual data inside packets. >>Operates at Level 7 (and below)
Symmetric encryption - correct answer have same key.
Asymmetric encryption - correct answer one public and one private key.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller KieranKent55. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.49. You're not tied to anything after your purchase.