100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D315 Network and Security Foundation Verified Questions And Answers,,,ALREADY PASSED $22.99   Add to cart

Exam (elaborations)

WGU D315 Network and Security Foundation Verified Questions And Answers,,,ALREADY PASSED

 14 views  3 purchases
  • Course
  • WGU D315
  • Institution
  • WGU D315

WGU D315 Network and Security Foundation Verified Questions And Answers,,,ALREADY PASSED

Preview 3 out of 25  pages

  • June 19, 2024
  • 25
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
  • wgu d315
  • WGU D315
  • WGU D315
avatar-seller
MEGAMINDS
WGU D315 Network and Security Foundation Verified
Questions And Answers,,,ALREADY PASSED

1. Which layer of the OSI model is responsible for error checking
and reliable packet delivery?
o A) Application
o B) Network
o C) Transport
o D) Physical
2. What type of attack involves an attacker intercepting
communication between two parties without their knowledge?
o A) Phishing
o B) Man-in-the-middle
o C) Denial of Service
o D) Virus attack
3. Which protocol is used for securely browsing the web?
o A) HTTP
o B) FTP
o C) HTTPS
o D) SMTP
4. What is the primary function of a firewall?
o A) To block unauthorized access while allowing authorized
communications
o B) To increase the network speed
o C) To provide a platform for web services
o D) To offer dynamic IP address assignment
5. What does VPN stand for and what is its primary use?
o A) Virtual Public Network, used for creating private networks
over the internet
o B) Virtual Private Network, used for secure remote access
o C) Very Protected Network, used for network optimization
o D) Vital Packet Node, used for packet management

,6. Which type of encryption is considered more secure?
o A) Asymmetric encryption
o B) Symmetric encryption
o C) Hashing
o D) Encoding
7. What is the purpose of a DMZ in network security?
o A) To serve as a backup for network data
o B) To act as a public-facing segment of the network
o C) To provide an additional layer of security between
external and internal network boundaries
o D) To monitor network performance
8. Which protocol is used to assign IP addresses dynamically?
o A) HTTP
o B) SNMP
o C) DHCP
o D) FTP
9. What mechanism does SSH employ to secure remote login
sessions?
o A) Token-based authentication
o B) Encryption
o C) Captcha verification
o D) Biometric security
10. Which type of attack exploits software vulnerabilities to
execute malicious code?
o A) Phishing attack
o B) SQL injection
o C) Buffer overflow
o D) Cross-site scripting


11. What tool can be used to test network security by simulating
an attack?
o A) Firewall
o B) Penetration testing software

, o C) Proxy server
o D) Network switch
12. Which technology creates a secure and encrypted
connection over a less secure network, such as the internet?
o A) Proxy
o B) VPN (Virtual Private Network)
o C) VLAN
o D) Firewall
13. What is the primary function of an intrusion detection
system (IDS)?
o A) Filtering outgoing traffic
o B) Assigning IP addresses
o C) Detecting and responding to malicious activities
o D) Encrypting data
14. Which protocol helps secure communications across a
network by transforming data into a secure format?
o A) DHCP
o B) SNMP
o C) SSL (Secure Sockets Layer)
o D) FTP
15. What does the term 'phishing' refer to in the context of
cybersecurity?
o A) A type of virus that infects a computer
o B) A method of trying to gather personal information using
deceptive e-mails and websites
o C) The process of increasing network bandwidth
o D) Encrypting confidential data
16. Which is a common method to authenticate a user’s identity
electronically?
o A) Data encryption
o B) Biometric verification
o C) Penetration testing
o D) Protocol analysis

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller MEGAMINDS. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $22.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79223 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$22.99  3x  sold
  • (0)
  Add to cart