WGU - Network &
Security Foundations -
Section 2: Intro to
Networking Security
exam with 100+
questions and answers
This protects information and
Information security (1 .1)
resources.
This protects data, networks,
Network security (1 .1)
hardware, and software.
(1) prevent and monitor
I unauthorized access to the network
I and network resources, (2) prevent
What are the four main any malicious activities such
purposes of as
network security? I misuse, modification,
disruption, and
destruction, (3) protect data during
1.
,..
: transmission and at rest,
and (4) protect network
assets. (1 .1 )
List three main reasons to implement (1) Ensure availability
of resources, network security: (2) provide authentication
and authorization on network resources,
I and (3) protect resources while
allowing access to legitimate
users.
I (1 .1)
List the six elements of a Explain the importance of
network that are protecting network
protected by network applications using network
security: security:
I (1) Networks, (2) network
applications, (3) network
devices and systems, (4)
network protocols, (5)
network services, and (6)
data. (1 .1)
: "A network could be a
Explain the importance of single entity, basically, it
protecting networks using could be a small network or
network security: it could be a large enterprise
network, where it is spread
across
I geographies, it uses different
subnets and segments.
..
,..
I ensure that the web
application does
notgodown."(1.1
)
There is a demilitarized I availability, ensuring that
zone for the servers they are load balanced or
I that is facing the there is a fault
Internet. So depending on : tolerance built into the
the size of the databases to Explain the
organization, the network importance of protecting
size may I also differ. network devices using
You need to ensure that network security:
network be of whatever
size needs to be
protected." (1 .1 )
"There could be network
applications : which would
be internal to your
organization and then there
will be : web applications
which need to be external
to your organization. Your Explain the importance of
I customer vendors or a protecting network protocols
mass using network security:
I population of users would : "In a network, you have the
be network : devices, which
: accessing these web could be the router, or the
applications. These need firewall, switches, and then
to be protected. There is there : would be systems,
going to be a role of which would be the servers
encryption, and the endpoints, which : are
1.
, ..
the desktops, mobiles as I you need to ensure that we
well as do not use weaker protocols
: the laptops. It is important like FTP or Telnet, use
to harden the servers, stronger protocols which are
which could include your difficult to break. So you
I
web server, or DNS server, have
or domain controller. It is SFTP, then you have SSI-HI
equally important for I you which is
to harden the endpoints, I secure shell." (1.1)
which are your desktops. Explain the importance of
The majority of the attacks protecting network services
are initiated on the end I using network security:
user. Nowadays threat "To protect this network
actors have lesser attention component,
on the servers and : the I remember there would
network devices, but they be a lot of I network
have I more attention on services that would be
the endpoints running on a network. It
I
because that is an easy could be your, as simple as
entry point into the NTP servers, it
network. You need to ensure : could be domain controller
your network devices and services,
all systems I or it could be any other
secured." (1 .1)
I are properly covered services such as the voice
under the I network services. You need to
security." (1 .1) I ensure that all these
services are
"To protect this network
component,
..