100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C172 Network & Security Focused on Vulnerabilities, Risks, Attacks &Threats Exam Questions and Answers 2024/2025 $12.39   Add to cart

Exam (elaborations)

WGU C172 Network & Security Focused on Vulnerabilities, Risks, Attacks &Threats Exam Questions and Answers 2024/2025

 7 views  0 purchase
  • Course
  • WGU C172 Network & Security
  • Institution
  • WGU C172 Network & Security

WGU C172 Network & Security Focused on Vulnerabilities, Risks, Attacks &Threats Exam Questions and Answers 2024/2025 Database Control - correct answer SQL Injection and Buffer Overflow Man in the Middle (mitm) - correct answer impersonates both the sender & the receiver to intercept communica...

[Show more]

Preview 2 out of 13  pages

  • November 2, 2024
  • 13
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU C172 Network & Security
  • WGU C172 Network & Security
avatar-seller
KieranKent55
WGU C172 Network & Security Focused on
Vulnerabilities, Risks, Attacks &Threats Exam
Questions and Answers 2024/2025

Database Control - correct answer SQL Injection and Buffer Overflow


Man in the Middle (mitm) - correct answer impersonates both the sender & the receiver
to intercept communication between two systems. A hacker hijacks a session between
trusted client and network server.


Attacks occur in various OSI Layers. Uses IP spoofing at its base, it goes a mile beyond
that in order to gain control, by choosing sessions from one or more layers to be
hijacked.
Intrusion Prevention systems and ipsec can help. - correct answer The method used to
mitigate a Man in the Middle (mitm) attack.


Vulnerability Testers - correct answer Outside consultants may scan the network and
point out vulnerabilities & how to fix.


Denial of Service (dos) - correct answer Denying service to a computer, network or
network server by overwhelming the victim with large amounts of useless traffic. One
computer is used to flood a server with TCP and UDP packets.


VLAN Hopping - correct answer A method of attacking networked resources on a
VLAN.


VLAN Hopping - correct answer An attacking host on a VLAN gains access to traffic on
other vlans that would normally not be accessible.
Configure the switch Access Control File per the vendor's recommendation. - correct
answer The method used to mitigate a VLAN Hopping attack.

, Transport (4) - in other OSI Layers. Referred to as blackholing, is a method typically
used by isps to stop an attack on one of its customers. Basically, the site is taken down
entirely so other sites on the network are not affected - correct answer The method
used to mitigate a ddos attack.


Spoofing - correct answer VLAN Hopping and Man in the Middle (mitm)


Ping of Death - correct answer Attacker pings the target & sends a ICMP packet over
the max of 65,535 bytes and causes the victim's system to crash or stop functioning.
Causes buffer overflow and crashes.


SMURF ddos (distributed attack) - correct answer Rather than one computer sending
ICMP packets, multiple computers are replying to the ICMP packet.


Network (3)
Update operating systems. Configure Web Application firewall to drop malformed
packets. - correct answer The method used to mitigate a Ping of Death attack.


Ping Flood (Starts with Ping Sweep) - correct answer an information gathering
technique which is used to identify live hosts by pinging them. After, the attacker
overwhelms victim's computer with a large amount of ICMP echo-request packets.


Trunk mode - correct answer if a network administrator mistakenly configures a
computer's switch port as ____________________ the computer may be able to send
and receive traffic on any VLAN on the switch.


SMURF ddos (distributed attack) - correct answer It spoofs the source address for all
ICMP packets


Deauth Attack (Deauthentication (abbreviated deauth)) - correct answer a denial-of-
service (dos) attack where the attacker can force any client (or even every client) off of
the network.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller KieranKent55. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.39. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.39
  • (0)
  Add to cart