WGU D482 Secure Network Design OA ACTUAL EXAM
2025/2026 COMPLETE QUESTIONS WITH CORRECT
DETAILED ANSWERS || 100% GUARANTEED PASS
<BRAND NEW VERSION>
A laptop has been stolen, and the data has been seen for sale
on the darknet. Which process could have protected the
confidentiality of the data? .......Answer.........Hard Drive
Encryption
Classify each attack method in relation to its direct impact on the
CIA triad. .......Answer.........Key Logger: Confidentiality
DNS Poisoning: Integrity
Covert Channels: Confidentiality
DDoS: Availability
,age 2 of 46
A security administrator has configured a small keysize to
protect the VPN.
Which security objective does this affect?
.......Answer.........Confidentiality
A laptop has been stolen, and the data has been seen for sale
on the darknet.
Which process could have protected the confidentiality of the
data? .......Answer.........Hard Drive encryption
When browsing to a financial website, a user receives an error
on the browser that points to the certificate
on the website. The user reviews the certificate and maps it to a
known certificate authority.
,age 3 of 46
Why did the user need to perform these actions?
.......Answer.........To establish a trust relationship
A team of scientists is working on a secure project. The network
administrator needs to configure a
network for the team that is not routable from the Internet. A
firewall is protecting the scientists' network
and is using network address translation (NAT) to translate the
internal IP addresses to public IP
addresses.
Which IP address should the network administrator configure on
the inside interface of the firewall? .......Answer.........10.14.15.16
An ad hoc network design team has just finished a presentation
on the latest updates to the organization's
, age 4 of 46
network infrastructure. The team ensured that plenty of
redundancy has been built in and bottlenecks
have been eliminated.
Which security objective has the team bolstered through these
improvements? .......Answer.........Availability
A company has recently implemented a new email encryption
system that uses public key infrastructure
(PKI). The company is now requiring all employees to sign and
encrypt internal communication. An
employee wants to send a digitally signed message to the IT
director.