Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU - C700 – PreAssessment QUESTIONS AND ANSWERS GRADED A

Beoordeling
-
Verkocht
-
Pagina's
16
Cijfer
A+
Geüpload op
19-10-2022
Geschreven in
2022/2023

An organization that uses a client-server model permits remote user machines to access its network and distributed resources. With this setup, the organization recognizes that remotely used client machines can become threats. Which requirement should this company subject its remote clients to in order to secure data and communications in the system? Create a fortress mentality for secure data communications Run processes in user and supervisory modes at the same time Allow users only minimal but not necessary access to sensitive resources Install restricted user-interface mechanisms and database management systems Correct Answer: Install restricted user-interface mechanisms and database management systems A technology-based firm wants to implement secure data communication between secure desktops to a remote server while keeping reliability as the most important requirement in its scope. Which kind of secure data communication should be used within a WAN environment? Transmission control protocol (TCP) User datagram protocol (UDP) Point-to-point protocol (PPP) Hypertext transfer protocol (HTTP) Correct Answer: Transmission control protocol (TCP) A systems developer needs to reduce or eliminate the vulnerability of impersonation. Which security solution should this system developer adopt? Restrict access Digital signatures Blacklist services Blocking attachments Correct Answer: Digital signatures A systems developer needs to create a subscription system for a list of known email abuse sources. Which solution should be used to create this item? Blacklist services Whitelist services

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

WGU - C700 – PreAssessment QUESTIONS AND
ANSWERS GRADED A
An organization that uses a client-server model permits remote user machines to access its
network and distributed resources. With this setup, the organization recognizes that remotely
used client machines can become threats.

Which requirement should this company subject its remote clients to in order to secure data and
communications in the system?

Create a fortress mentality for secure data communications
Run processes in user and supervisory modes at the same time
Allow users only minimal but not necessary access to sensitive resources
Install restricted user-interface mechanisms and database management systems Correct Answer:
Install restricted user-interface mechanisms and database management systems

A technology-based firm wants to implement secure data communication between secure
desktops to a remote server while keeping reliability as the most important requirement in its
scope.

Which kind of secure data communication should be used within a WAN environment?

Transmission control protocol (TCP)
User datagram protocol (UDP)
Point-to-point protocol (PPP)
Hypertext transfer protocol (HTTP) Correct Answer: Transmission control protocol (TCP)

A systems developer needs to reduce or eliminate the vulnerability of impersonation.

Which security solution should this system developer adopt?

Restrict access
Digital signatures
Blacklist services
Blocking attachments Correct Answer: Digital signatures

A systems developer needs to create a subscription system for a list of known email abuse
sources.

Which solution should be used to create this item?

Blacklist services
Whitelist services
Subscription services
Domain name services Correct Answer: Blacklist services

,A software developer needs to secure emails for a bank using a public-private key system. The
system should include a variety of algorithms that encrypt files and email messages.

Which email security solution should this developer use?

Pretty good privacy
DomainKeys identified mail
Post office protocol 3 (POP3)
Simple mail transfer protocol (SMTP) Correct Answer: Pretty good privacy

Which service manages the monitoring of devices within the application layer?

File transfer protocol (FTP)
Point-to-point protocol (PPP)
Hypertext transfer protocol secure (HTTPS)
Simple network management protocol (SNMP) Correct Answer: Simple network management
protocol (SNMP)

Which service is managed at the transport layer of the TCP/IP stack?

Network file services (NFS)
User datagram protocol (UDP)
Hypertext transfer protocol (HTTP)
Simple mail transfer protocol (SMTP) Correct Answer: User datagram protocol (UDP)

Which layer of TCP/IP composes the simplex connectionless protocol user datagram protocol
(UDP)?

Network
Transport
Application
Presentation Correct Answer: Transport

Which layer of the OSI model is affected if a data center experienced a power outage with no
backup power supply?

Session
Network
Physical
Transport Correct Answer: Physical

Which layer is affected if an organization has weak authentication communication protocols?

Session
Transport
Application

, Presentation Correct Answer: Session

A consultant explains that there is no mechanism within internet control message protocol
(ICMP) for the retransmission of lost or damaged packets.

Why are ICMP error messages sent to the host?

Transmission control protocol (TCP) connection-related protocols can detect errors.
They help the sending process or its human user to diagnose problems.
Connection- or session-related protocols detect errors in the local area network (LAN).
ICMP automatically retransmits every other packet to support WAN connectivity. Correct
Answer: They help the sending process or its human user to diagnose problems.

According to error logs associated with the local area network (LAN), one of the layers of the
OSI model needs to be used to provide error correction.

Which layer should be used?

Session
Data link
Transport
Application Correct Answer: Transport

A software developer needs to disconnect a transmission control protocol (TCP) session when a
communication session is complete.

What is the first packet that ensures this process?

FIN flagged packet
SYN flagged packet
ACK flagged packet
RST flagged packet Correct Answer: FIN flagged packet

A software developer establishes a communication between a web server and a web browser
over a network connection.

Which protocol is encapsulated in the transmission control protocol (TCP) to ensure this action?

User datagram protocol (UDP)
File transfer protocol (FTP)
Simple mail transfer protocol (SMTP)
Hypertext transfer protocol (HTTP) Correct Answer: Hypertext transfer protocol (HTTP)

How would hackers sniff network traffic during an address resolution protocol (ARP) poisoning
attack?

By locating corresponding media access control (MAC) addresses using reverse ARP

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
19 oktober 2022
Aantal pagina's
16
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$8.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Classroom NURSING
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
4885
Lid sinds
4 jaar
Aantal volgers
3234
Documenten
55440
Laatst verkocht
9 uur geleden
NURSING

Assignments, Case Studies, Research, Essay writing service, Questions and Answers, Discussions etc. for students who want to see results twice as fast. I have done papers of various topics and complexities. I am punctual and always submit work on-deadline. I write engaging and informative content on all subjects. Send me your research papers, case studies, psychology papers, etc, and I’ll do them to the best of my abilities. Writing is my passion when it comes to academic work. I’ve got a good sense of structure and enjoy finding interesting ways to deliver information in any given paper. I love impressing clients with my work, and I am very punctual about deadlines. Send me your assignment and I’ll take it to the next level. I strive for my content to be of the highest quality. Your wishes come first— send me your requirements and I’ll make a piece of work with fresh ideas, consistent structure, and following the academic formatting rules. For every student you refer to me with an order that is completed and paid transparently, I will do one assignment for you, free of charge!!!!!!!!!!!!

Lees meer Lees minder
4.0

1192 beoordelingen

5
631
4
216
3
196
2
40
1
109

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen