Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU - MSCSIA - C700 - Secure Network Design - 2019 - Practice Test | 379 Questions with 100% Correct Answers

Rating
-
Sold
-
Pages
25
Grade
A+
Uploaded on
19-10-2022
Written in
2022/2023

What is another term for a demilitarized zone (DMZ)? Correct Answer: Screened subnet is another term for a demilitarized zone (DMZ). Two firewalls are used in this configuration: one firewall resides between the public network and DMZ, and the other resides between the DMZ and private network. Screened subnet Correct Answer: is another term for a demilitarized zone (DMZ). Two firewalls are used in this configuration: one firewall resides between the public network and DMZ, and the other resides between the DMZ and private network. A screened host is Correct Answer: a firewall that resides between the router that connects a network to the Internet and the private network. The router acts as a screening device, and the firewall is the screen host. This firewall employs two network cards and a single screening router. A dual-homed firewall is Correct Answer: one that has two network interfaces: one interface connects to the Internet, and the other connects to the private network. One of the most common drawbacks to dual-homed firewalls is that internal routing may accidentally become enabled. APIPA Correct Answer: ? Infrastructure mode Correct Answer: allows wireless computers to connect to a LAN, a WAN, or the Internet. This means that infrastructure mode wireless computers can access all computers on the LAN, WAN, and Internet. Infrastructure mode is much more expensive to implement than ad hoc mode because you must configure wireless access points. While infrastructure mode is harder to set up and configure, it is much easier to manage than ad hoc mode. Ad hoc mode Correct Answer: allows wireless computers to be configured much more quickly than infrastructure mode. computers all participate in the same network. This means that the wireless computers can access each other, but cannot access network resources on a LAN, WAN, or Internet. is much cheaper than infrastructure mode to implement. In addition, it is easy to set up and configure and can provide better performance than infrastructure mode. However, it is difficult to manage. Static IP addresses should not be implemented because the corporate network contains a DHCP server. Correct Answer: static IP APIPA should not be used for the same reason. In addition, APIPA is utilized only if a DHCP server is not found. Correct Answer: APIPA The Ethernet LAN technology does NOT use a multistation access unit (MAU) as its central device Correct Answer: The Ethernet LAN technology does NOT use a multistation access unit (MAU) as its central device Multi-station Access Unit (MAU) Correct Answer: Central device in a Token Ring network which passes the Token from device to device serially in order and in a one-way direction. Token Ring supports Correct Answer: full duplex transmission using carrier sense multiple access with collision avoidance (CSMA/CA). Ethernet LAN technology Correct Answer: supports full duplex transmissions. It uses carrier sense multiple access with collision detection (CSMA/CD). It is defined by IEEE 802.3 Full-duplex can Correct Answer: transmit and receive information in both directions simultaneously. synchronous transmission h

Show more Read less
Institution
Course

Content preview

WGU - MSCSIA - C700 - Secure Network Design - 2019 - Practice
Test | 379 Questions with 100% Correct Answers
What is another term for a demilitarized zone (DMZ)? Correct Answer: Screened subnet is
another term for a demilitarized zone (DMZ). Two firewalls are used in this configuration: one
firewall resides between the public network and DMZ, and the other resides between the DMZ
and private network.

Screened subnet Correct Answer: is another term for a demilitarized zone (DMZ). Two firewalls
are used in this configuration: one firewall resides between the public network and DMZ, and the
other resides between the DMZ and private network.

A screened host is Correct Answer: a firewall that resides between the router that connects a
network to the Internet and the private network. The router acts as a screening device, and the
firewall is the screen host. This firewall employs two network cards and a single screening
router.

A dual-homed firewall is Correct Answer: one that has two network interfaces: one interface
connects to the Internet, and the other connects to the private network. One of the most common
drawbacks to dual-homed firewalls is that internal routing may accidentally become enabled.

APIPA Correct Answer: ?

Infrastructure mode Correct Answer: allows wireless computers to connect to a LAN, a WAN,
or the Internet.

This means that infrastructure mode wireless computers can access all computers on the LAN,
WAN, and Internet.

Infrastructure mode is much more expensive to implement than ad hoc mode because you must
configure wireless access points.

While infrastructure mode is harder to set up and configure, it is much easier to manage than ad
hoc mode.

Ad hoc mode Correct Answer: allows wireless computers to be configured much more quickly
than infrastructure mode.

computers all participate in the same network.

This means that the
wireless computers can access each other, but cannot access network resources on a LAN, WAN,
or Internet.

is much cheaper than infrastructure mode to implement.

,In addition, it is easy to set up and configure and can provide better performance than
infrastructure mode.

However, it is difficult to manage.

Static IP addresses should not be implemented because the corporate network contains a DHCP
server. Correct Answer: static IP

APIPA should not be used for the same reason. In addition, APIPA is utilized only if a DHCP
server is not found. Correct Answer: APIPA

The Ethernet LAN technology does NOT use a multistation access unit (MAU) as its central
device Correct Answer: The Ethernet LAN technology does NOT use a multistation access unit
(MAU) as its central device

Multi-station Access Unit (MAU) Correct Answer: Central device in a Token Ring network
which passes the Token from device to device serially in order and in a one-way direction.

Token Ring supports Correct Answer: full duplex transmission using carrier sense multiple
access with collision avoidance (CSMA/CA).

Ethernet LAN technology Correct Answer: supports full duplex transmissions.

It uses carrier sense multiple access with collision detection (CSMA/CD).

It is defined by IEEE 802.3

Full-duplex can Correct Answer: transmit and receive information in both directions
simultaneously.

synchronous transmission has Correct Answer: a start bit is used to indicate the beginning of
transmission.

The start bit is followed by data bits, and then one or two stop bits follow to indicate the end of
the transmission.

In synchronous transmission, Correct Answer: the transmitter and receiver have synchronized
clocks and the data is sent in a continuous stream.

The clocks are synchronized by using transitions in the data and, therefore, start and stop bits are
not required for each unit of data sent

Half-duplex transmissions are Correct Answer: transmissions in which information can be
transmitted in two directions, but only one direction at a time.

, You should complete all of the following steps to protect against war-driving attacks: Correct
Answer: 1. Change the default SSID.
2. Disable SSID broadcasts.
3. Configure the network to use
authenticated access only.f
4. Implement Wi-Fi Protected Access (WPA) or WPA2 instead of WEP.
5. Reduce the access point signal strength.

NetStumbler is a Correct Answer: common war-driving tool.

To idenfity unauthorized wireless access points you should Correct Answer: periodically
complete a site survey

The reason you would disable SSID broadcasts is to Correct Answer: protect a wireless network
from hackers and to prevent unauthorized site surveys.

WEP - Uses a X-bit or X-bit key Correct Answer: 40bit or 104 bit

WPA/WPA2 Personal - Uses a x-bit key Correct Answer: 256-bit pre-shared key

WPA/WPA2 Enterprise - Requires a Correct Answer: RADIUS server

Dictionary attack - occurs when a Correct Answer: hacker tries to guess passwords using a list
of common words

DoS attack - occurs when a Correct Answer: server or resource is overloaded so that legitimate
users cannot access it

Pharming attack - occurs when Correct Answer: traffic is redirected to a site that looks identical
to the intended site

Phishing attack - occurs when Correct Answer: confidential information is requested by an
entity that appears to be legitimate

WEP/WPA cracking - Correct Answer: Mathematical algorithms are used to determine the pre-
shared key used on the access point.

Warchalking - Correct Answer: SSID and other authentication details regarding a wireless
network are written down in a prominent public place.

Evil twin - Correct Answer: A rogue access point is configured with the same SSID as a valid
access point.

A bastion host is a computer that Correct Answer: resides on a network that is locked down to
provide maximum security.

Written for

Institution
Course

Document information

Uploaded on
October 19, 2022
Number of pages
25
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$12.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Classroom NURSING
Follow You need to be logged in order to follow users or courses
Sold
4883
Member since
4 year
Number of followers
3233
Documents
55436
Last sold
7 hours ago
NURSING

Assignments, Case Studies, Research, Essay writing service, Questions and Answers, Discussions etc. for students who want to see results twice as fast. I have done papers of various topics and complexities. I am punctual and always submit work on-deadline. I write engaging and informative content on all subjects. Send me your research papers, case studies, psychology papers, etc, and I’ll do them to the best of my abilities. Writing is my passion when it comes to academic work. I’ve got a good sense of structure and enjoy finding interesting ways to deliver information in any given paper. I love impressing clients with my work, and I am very punctual about deadlines. Send me your assignment and I’ll take it to the next level. I strive for my content to be of the highest quality. Your wishes come first— send me your requirements and I’ll make a piece of work with fresh ideas, consistent structure, and following the academic formatting rules. For every student you refer to me with an order that is completed and paid transparently, I will do one assignment for you, free of charge!!!!!!!!!!!!

Read more Read less
4.0

1192 reviews

5
631
4
216
3
196
2
40
1
109

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions