Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D315 Network and Security Pre-Assessment Exam Questions and Answers

Beoordeling
-
Verkocht
-
Pagina's
15
Cijfer
A+
Geüpload op
09-01-2025
Geschreven in
2024/2025

A network is being created for an office, and there is a need for a router that manages internal network connections with no contact with the internet. Core router An IT manager is designing a new network and needs a device that connects multiple networks. Which device is needed Router A network in a small office building connects all devices using wired connections with a star topology. Which type of network is described? LAN An executive uses Bluetooth to connect a laptop, a mobile phone, and a headset. Which type of network is described? PAN A city uses fiber optic cable to connect smaller networks throughout the whole city. Which type of network is described? MAN Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to view a list of network addresses and port numbers. Which command in Linux should be used for this purpose? netstat Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to determine which ports have an active connection. Which command in Windows should be used for this purpose? netstat -an In the process of setting up a Linux-based network system, a technician needs to view network interfaces and their settings. Which command should be used? ifconfig A person is troubleshooting a network issue and needs to test DNS connectivity. Which Linux command should be used? nslookup What is the TCP/IP layer that includes the Transmission Control Protocol (TCP)? Transport Which layer of the TCP/IP model includes the Internet Message Access Protocol (IMAP)? Application Which OSI model layer creates, maintains, and disconnects process communications over the network? Session Which OSI model layer is responsible for breaking data into packets? Transport Which layer of the OSI reference model includes all computer programs that interact with the network? Application What is the OSI model layer that includes the IPX? Network What is the layer of the OSI model that is responsible for logical addressing? Network What is the layer of the OSI model that translates binary computer language into the language of the transmission medium? Physical A company uses cloud service to manage its IT resources. The underlying hardware resources are shared by other companies as well. What is the cloud deployment model described in the scenario? Public An organization uses one cloud service provider for data management and another service provider for development platforms. What is the cloud deployment model described in the scenario? Multi A company needs to maximize the number of virtual machines that can run on each host. Which hypervisor should be used? Type 1 A developer has an existing computer with an operating system. The developer wants to use a hypervisor to have access to several virtual machines for a specific project. Which form of hypervisor fits the need described in the scenario? Type 2 An attacker gains unauthorized access to a computer and modifies browser security settings. What is the purpose of the attack? Data modification An attacker uses a trojan horse to forward usernames and passwords to an anonymous email address. What is the purpose of the attack? Data export A hacker purposefully breaks IT security to gain unauthorized access to systems and publish sensitive data. Which term describes the given hacker? Black-hat A hacker acts as an information system security professional who is hired to perform penetration testing. Which term describes the given hacker? White-hat An organization is the victim of an attack in which an attacker uses a software program to try all possible combinations of a password and user ID. What is the type of cyberattack described in this scenario? Brute-force attack A data breach exposed usernames and passwords to customer accounts of an online retailer. An attacker uses the exposed data to attempt to access accounts of another online retailer. Which malicious attack strategy is represented in the scenario? Credential stuffing

Meer zien Lees minder
Instelling
Vak









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
9 januari 2025
Aantal pagina's
15
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$13.50
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
boomamor2 NURSING
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1025
Lid sinds
4 jaar
Aantal volgers
733
Documenten
3711
Laatst verkocht
1 maand geleden

4.0

116 beoordelingen

5
60
4
24
3
16
2
4
1
12

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen