100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU - C700 – PreAssessment QUESTIONS AND ANSWERS GRADED A $8.49   Add to cart

Exam (elaborations)

WGU - C700 – PreAssessment QUESTIONS AND ANSWERS GRADED A

 19 views  0 purchase
  • Course
  • Institution

An organization that uses a client-server model permits remote user machines to access its network and distributed resources. With this setup, the organization recognizes that remotely used client machines can become threats. Which requirement should this company subject its remote clients to i...

[Show more]

Preview 3 out of 16  pages

  • October 19, 2022
  • 16
  • 2022/2023
  • Exam (elaborations)
  • Questions & answers
avatar-seller
WGU - C700 – PreAssessment QUESTIONS AND
ANSWERS GRADED A
An organization that uses a client-server model permits remote user machines to access its
network and distributed resources. With this setup, the organization recognizes that remotely
used client machines can become threats.

Which requirement should this company subject its remote clients to in order to secure data and
communications in the system?

Create a fortress mentality for secure data communications
Run processes in user and supervisory modes at the same time
Allow users only minimal but not necessary access to sensitive resources
Install restricted user-interface mechanisms and database management systems Correct Answer:
Install restricted user-interface mechanisms and database management systems

A technology-based firm wants to implement secure data communication between secure
desktops to a remote server while keeping reliability as the most important requirement in its
scope.

Which kind of secure data communication should be used within a WAN environment?

Transmission control protocol (TCP)
User datagram protocol (UDP)
Point-to-point protocol (PPP)
Hypertext transfer protocol (HTTP) Correct Answer: Transmission control protocol (TCP)

A systems developer needs to reduce or eliminate the vulnerability of impersonation.

Which security solution should this system developer adopt?

Restrict access
Digital signatures
Blacklist services
Blocking attachments Correct Answer: Digital signatures

A systems developer needs to create a subscription system for a list of known email abuse
sources.

Which solution should be used to create this item?

Blacklist services
Whitelist services
Subscription services
Domain name services Correct Answer: Blacklist services

,A software developer needs to secure emails for a bank using a public-private key system. The
system should include a variety of algorithms that encrypt files and email messages.

Which email security solution should this developer use?

Pretty good privacy
DomainKeys identified mail
Post office protocol 3 (POP3)
Simple mail transfer protocol (SMTP) Correct Answer: Pretty good privacy

Which service manages the monitoring of devices within the application layer?

File transfer protocol (FTP)
Point-to-point protocol (PPP)
Hypertext transfer protocol secure (HTTPS)
Simple network management protocol (SNMP) Correct Answer: Simple network management
protocol (SNMP)

Which service is managed at the transport layer of the TCP/IP stack?

Network file services (NFS)
User datagram protocol (UDP)
Hypertext transfer protocol (HTTP)
Simple mail transfer protocol (SMTP) Correct Answer: User datagram protocol (UDP)

Which layer of TCP/IP composes the simplex connectionless protocol user datagram protocol
(UDP)?

Network
Transport
Application
Presentation Correct Answer: Transport

Which layer of the OSI model is affected if a data center experienced a power outage with no
backup power supply?

Session
Network
Physical
Transport Correct Answer: Physical

Which layer is affected if an organization has weak authentication communication protocols?

Session
Transport
Application

, Presentation Correct Answer: Session

A consultant explains that there is no mechanism within internet control message protocol
(ICMP) for the retransmission of lost or damaged packets.

Why are ICMP error messages sent to the host?

Transmission control protocol (TCP) connection-related protocols can detect errors.
They help the sending process or its human user to diagnose problems.
Connection- or session-related protocols detect errors in the local area network (LAN).
ICMP automatically retransmits every other packet to support WAN connectivity. Correct
Answer: They help the sending process or its human user to diagnose problems.

According to error logs associated with the local area network (LAN), one of the layers of the
OSI model needs to be used to provide error correction.

Which layer should be used?

Session
Data link
Transport
Application Correct Answer: Transport

A software developer needs to disconnect a transmission control protocol (TCP) session when a
communication session is complete.

What is the first packet that ensures this process?

FIN flagged packet
SYN flagged packet
ACK flagged packet
RST flagged packet Correct Answer: FIN flagged packet

A software developer establishes a communication between a web server and a web browser
over a network connection.

Which protocol is encapsulated in the transmission control protocol (TCP) to ensure this action?

User datagram protocol (UDP)
File transfer protocol (FTP)
Simple mail transfer protocol (SMTP)
Hypertext transfer protocol (HTTP) Correct Answer: Hypertext transfer protocol (HTTP)

How would hackers sniff network traffic during an address resolution protocol (ARP) poisoning
attack?

By locating corresponding media access control (MAC) addresses using reverse ARP

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $8.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75323 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$8.49
  • (0)
  Add to cart