Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU - MSCSIA - C700 - Secure Network Design - 2019 - Practice Test | 379 Questions with 100% Correct Answers

Beoordeling
-
Verkocht
-
Pagina's
25
Cijfer
A+
Geüpload op
19-10-2022
Geschreven in
2022/2023

What is another term for a demilitarized zone (DMZ)? Correct Answer: Screened subnet is another term for a demilitarized zone (DMZ). Two firewalls are used in this configuration: one firewall resides between the public network and DMZ, and the other resides between the DMZ and private network. Screened subnet Correct Answer: is another term for a demilitarized zone (DMZ). Two firewalls are used in this configuration: one firewall resides between the public network and DMZ, and the other resides between the DMZ and private network. A screened host is Correct Answer: a firewall that resides between the router that connects a network to the Internet and the private network. The router acts as a screening device, and the firewall is the screen host. This firewall employs two network cards and a single screening router. A dual-homed firewall is Correct Answer: one that has two network interfaces: one interface connects to the Internet, and the other connects to the private network. One of the most common drawbacks to dual-homed firewalls is that internal routing may accidentally become enabled. APIPA Correct Answer: ? Infrastructure mode Correct Answer: allows wireless computers to connect to a LAN, a WAN, or the Internet. This means that infrastructure mode wireless computers can access all computers on the LAN, WAN, and Internet. Infrastructure mode is much more expensive to implement than ad hoc mode because you must configure wireless access points. While infrastructure mode is harder to set up and configure, it is much easier to manage than ad hoc mode. Ad hoc mode Correct Answer: allows wireless computers to be configured much more quickly than infrastructure mode. computers all participate in the same network. This means that the wireless computers can access each other, but cannot access network resources on a LAN, WAN, or Internet. is much cheaper than infrastructure mode to implement. In addition, it is easy to set up and configure and can provide better performance than infrastructure mode. However, it is difficult to manage. Static IP addresses should not be implemented because the corporate network contains a DHCP server. Correct Answer: static IP APIPA should not be used for the same reason. In addition, APIPA is utilized only if a DHCP server is not found. Correct Answer: APIPA The Ethernet LAN technology does NOT use a multistation access unit (MAU) as its central device Correct Answer: The Ethernet LAN technology does NOT use a multistation access unit (MAU) as its central device Multi-station Access Unit (MAU) Correct Answer: Central device in a Token Ring network which passes the Token from device to device serially in order and in a one-way direction. Token Ring supports Correct Answer: full duplex transmission using carrier sense multiple access with collision avoidance (CSMA/CA). Ethernet LAN technology Correct Answer: supports full duplex transmissions. It uses carrier sense multiple access with collision detection (CSMA/CD). It is defined by IEEE 802.3 Full-duplex can Correct Answer: transmit and receive information in both directions simultaneously. synchronous transmission h

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

WGU - MSCSIA - C700 - Secure Network Design - 2019 - Practice
Test | 379 Questions with 100% Correct Answers
What is another term for a demilitarized zone (DMZ)? Correct Answer: Screened subnet is
another term for a demilitarized zone (DMZ). Two firewalls are used in this configuration: one
firewall resides between the public network and DMZ, and the other resides between the DMZ
and private network.

Screened subnet Correct Answer: is another term for a demilitarized zone (DMZ). Two firewalls
are used in this configuration: one firewall resides between the public network and DMZ, and the
other resides between the DMZ and private network.

A screened host is Correct Answer: a firewall that resides between the router that connects a
network to the Internet and the private network. The router acts as a screening device, and the
firewall is the screen host. This firewall employs two network cards and a single screening
router.

A dual-homed firewall is Correct Answer: one that has two network interfaces: one interface
connects to the Internet, and the other connects to the private network. One of the most common
drawbacks to dual-homed firewalls is that internal routing may accidentally become enabled.

APIPA Correct Answer: ?

Infrastructure mode Correct Answer: allows wireless computers to connect to a LAN, a WAN,
or the Internet.

This means that infrastructure mode wireless computers can access all computers on the LAN,
WAN, and Internet.

Infrastructure mode is much more expensive to implement than ad hoc mode because you must
configure wireless access points.

While infrastructure mode is harder to set up and configure, it is much easier to manage than ad
hoc mode.

Ad hoc mode Correct Answer: allows wireless computers to be configured much more quickly
than infrastructure mode.

computers all participate in the same network.

This means that the
wireless computers can access each other, but cannot access network resources on a LAN, WAN,
or Internet.

is much cheaper than infrastructure mode to implement.

,In addition, it is easy to set up and configure and can provide better performance than
infrastructure mode.

However, it is difficult to manage.

Static IP addresses should not be implemented because the corporate network contains a DHCP
server. Correct Answer: static IP

APIPA should not be used for the same reason. In addition, APIPA is utilized only if a DHCP
server is not found. Correct Answer: APIPA

The Ethernet LAN technology does NOT use a multistation access unit (MAU) as its central
device Correct Answer: The Ethernet LAN technology does NOT use a multistation access unit
(MAU) as its central device

Multi-station Access Unit (MAU) Correct Answer: Central device in a Token Ring network
which passes the Token from device to device serially in order and in a one-way direction.

Token Ring supports Correct Answer: full duplex transmission using carrier sense multiple
access with collision avoidance (CSMA/CA).

Ethernet LAN technology Correct Answer: supports full duplex transmissions.

It uses carrier sense multiple access with collision detection (CSMA/CD).

It is defined by IEEE 802.3

Full-duplex can Correct Answer: transmit and receive information in both directions
simultaneously.

synchronous transmission has Correct Answer: a start bit is used to indicate the beginning of
transmission.

The start bit is followed by data bits, and then one or two stop bits follow to indicate the end of
the transmission.

In synchronous transmission, Correct Answer: the transmitter and receiver have synchronized
clocks and the data is sent in a continuous stream.

The clocks are synchronized by using transitions in the data and, therefore, start and stop bits are
not required for each unit of data sent

Half-duplex transmissions are Correct Answer: transmissions in which information can be
transmitted in two directions, but only one direction at a time.

, You should complete all of the following steps to protect against war-driving attacks: Correct
Answer: 1. Change the default SSID.
2. Disable SSID broadcasts.
3. Configure the network to use
authenticated access only.f
4. Implement Wi-Fi Protected Access (WPA) or WPA2 instead of WEP.
5. Reduce the access point signal strength.

NetStumbler is a Correct Answer: common war-driving tool.

To idenfity unauthorized wireless access points you should Correct Answer: periodically
complete a site survey

The reason you would disable SSID broadcasts is to Correct Answer: protect a wireless network
from hackers and to prevent unauthorized site surveys.

WEP - Uses a X-bit or X-bit key Correct Answer: 40bit or 104 bit

WPA/WPA2 Personal - Uses a x-bit key Correct Answer: 256-bit pre-shared key

WPA/WPA2 Enterprise - Requires a Correct Answer: RADIUS server

Dictionary attack - occurs when a Correct Answer: hacker tries to guess passwords using a list
of common words

DoS attack - occurs when a Correct Answer: server or resource is overloaded so that legitimate
users cannot access it

Pharming attack - occurs when Correct Answer: traffic is redirected to a site that looks identical
to the intended site

Phishing attack - occurs when Correct Answer: confidential information is requested by an
entity that appears to be legitimate

WEP/WPA cracking - Correct Answer: Mathematical algorithms are used to determine the pre-
shared key used on the access point.

Warchalking - Correct Answer: SSID and other authentication details regarding a wireless
network are written down in a prominent public place.

Evil twin - Correct Answer: A rogue access point is configured with the same SSID as a valid
access point.

A bastion host is a computer that Correct Answer: resides on a network that is locked down to
provide maximum security.

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
19 oktober 2022
Aantal pagina's
25
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€11,54
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Classroom NURSING
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
4885
Lid sinds
4 jaar
Aantal volgers
3233
Documenten
55440
Laatst verkocht
2 dagen geleden
NURSING

Assignments, Case Studies, Research, Essay writing service, Questions and Answers, Discussions etc. for students who want to see results twice as fast. I have done papers of various topics and complexities. I am punctual and always submit work on-deadline. I write engaging and informative content on all subjects. Send me your research papers, case studies, psychology papers, etc, and I’ll do them to the best of my abilities. Writing is my passion when it comes to academic work. I’ve got a good sense of structure and enjoy finding interesting ways to deliver information in any given paper. I love impressing clients with my work, and I am very punctual about deadlines. Send me your assignment and I’ll take it to the next level. I strive for my content to be of the highest quality. Your wishes come first— send me your requirements and I’ll make a piece of work with fresh ideas, consistent structure, and following the academic formatting rules. For every student you refer to me with an order that is completed and paid transparently, I will do one assignment for you, free of charge!!!!!!!!!!!!

Lees meer Lees minder
4,0

1192 beoordelingen

5
631
4
216
3
196
2
40
1
109

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen