WGU - C700 – PreAssessment QUESTIONS AND ANSWERS GRADED A
19 views 0 purchase
Course
WGU C700
Institution
Western Governors University
An organization that uses a client-server model permits remote user machines to access its network and distributed resources. With this setup, the organization recognizes that remotely used client machines can become threats.
Which requirement should this company subject its remote clients to i...
wgu c700 – preassessment questions and answers graded a
Written for
Western Governors University
WGU C700
All documents for this subject (10)
Seller
Follow
Classroom
Reviews received
Content preview
WGU - C700 – PreAssessment QUESTIONS AND
ANSWERS GRADED A
An organization that uses a client-server model permits remote user machines to access its
network and distributed resources. With this setup, the organization recognizes that remotely
used client machines can become threats.
Which requirement should this company subject its remote clients to in order to secure data and
communications in the system?
Create a fortress mentality for secure data communications
Run processes in user and supervisory modes at the same time
Allow users only minimal but not necessary access to sensitive resources
Install restricted user-interface mechanisms and database management systems Correct Answer:
Install restricted user-interface mechanisms and database management systems
A technology-based firm wants to implement secure data communication between secure
desktops to a remote server while keeping reliability as the most important requirement in its
scope.
Which kind of secure data communication should be used within a WAN environment?
Transmission control protocol (TCP)
User datagram protocol (UDP)
Point-to-point protocol (PPP)
Hypertext transfer protocol (HTTP) Correct Answer: Transmission control protocol (TCP)
A systems developer needs to reduce or eliminate the vulnerability of impersonation.
Which security solution should this system developer adopt?
Restrict access
Digital signatures
Blacklist services
Blocking attachments Correct Answer: Digital signatures
A systems developer needs to create a subscription system for a list of known email abuse
sources.
Which solution should be used to create this item?
,A software developer needs to secure emails for a bank using a public-private key system. The
system should include a variety of algorithms that encrypt files and email messages.
Which email security solution should this developer use?
Pretty good privacy
DomainKeys identified mail
Post office protocol 3 (POP3)
Simple mail transfer protocol (SMTP) Correct Answer: Pretty good privacy
Which service manages the monitoring of devices within the application layer?
Which service is managed at the transport layer of the TCP/IP stack?
Network file services (NFS)
User datagram protocol (UDP)
Hypertext transfer protocol (HTTP)
Simple mail transfer protocol (SMTP) Correct Answer: User datagram protocol (UDP)
Which layer of TCP/IP composes the simplex connectionless protocol user datagram protocol
(UDP)?
Network
Transport
Application
Presentation Correct Answer: Transport
Which layer of the OSI model is affected if a data center experienced a power outage with no
backup power supply?
Session
Network
Physical
Transport Correct Answer: Physical
Which layer is affected if an organization has weak authentication communication protocols?
Session
Transport
Application
, Presentation Correct Answer: Session
A consultant explains that there is no mechanism within internet control message protocol
(ICMP) for the retransmission of lost or damaged packets.
Why are ICMP error messages sent to the host?
Transmission control protocol (TCP) connection-related protocols can detect errors.
They help the sending process or its human user to diagnose problems.
Connection- or session-related protocols detect errors in the local area network (LAN).
ICMP automatically retransmits every other packet to support WAN connectivity. Correct
Answer: They help the sending process or its human user to diagnose problems.
According to error logs associated with the local area network (LAN), one of the layers of the
OSI model needs to be used to provide error correction.
Which layer should be used?
Session
Data link
Transport
Application Correct Answer: Transport
A software developer needs to disconnect a transmission control protocol (TCP) session when a
communication session is complete.
What is the first packet that ensures this process?
FIN flagged packet
SYN flagged packet
ACK flagged packet
RST flagged packet Correct Answer: FIN flagged packet
A software developer establishes a communication between a web server and a web browser
over a network connection.
Which protocol is encapsulated in the transmission control protocol (TCP) to ensure this action?
User datagram protocol (UDP)
File transfer protocol (FTP)
Simple mail transfer protocol (SMTP)
Hypertext transfer protocol (HTTP) Correct Answer: Hypertext transfer protocol (HTTP)
How would hackers sniff network traffic during an address resolution protocol (ARP) poisoning
attack?
By locating corresponding media access control (MAC) addresses using reverse ARP
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $8.49. You're not tied to anything after your purchase.