WGU C172 Objective Assessment Exam (Latest 2023/ 2024 Update) Network and Security Foundations| Questions and Verified Answers| 100% Correct |Grade A

WGU C172 Objective Assessment Exam (Latest 2023/ 2024 Update) Network and Security Foundations| Questions and Verified Answers| 100% Correct |Grade A

WGU C172 Objective Assessment Exam
(Latest 2023/ 2024 Update) Network and
Security Foundations| Questions and Verified
Answers| 100% Correct |Grade A
Q: If someone poses as the IT network admin, walks into a building and asks for the
receptionist password to provide an update to their computer, what type of attack is this most
likely to be?
Answer:
Social engineering
Q: The two wireless infrastructure modes
Answer:
Ad hoc, infrastructure
Q: What is a proxy server?
Answer:
A server that authenticates and makes request on behalf of another system on the network
Q: An admin wants to look for video/audio in the network traffic logs. Which layer 4 protocol
should the admin filter results by?
Answer:
UDP

Q: What is the best scenario for a hybrid cloud solution?
Answer:
The Marine Corps uses servers in Azure to process images and keeps the processed images in a
datacenter owned by DoD for use by other branches of military.
Q: Describe a personal firewall
Answer:
A type of software that protects a computer from network attacks
Q: If you are using an unsecure network and need to login to data you would like keep secure
during transmission what should you do?
Answer:
Deploy a VPN (Virtual Private Network) and use a secure tunneling protocol
Q: How can a network admin harden hosts and network devices?
Answer:
Lock all doors to IT assets
Remove default or out of the box passwords.
Remove all unnecessary logins
Keep patches up to date
Audit Access
Q: ARP Poisoning allows an attacker to
Answer:
Eavesdrop on the traffic sent through the Switch
Powered by https://learnexams.com/search/study?query=

Phishing
Which type of attack sends emails claiming to be your bank and asking you to verify that your username and password are correct?

Port Scanning
A __ attack sends TCP/IP traffic to each and every port to learn which services are running

BYOD/mobile
When a company allows it users to access company resources through their personal cell phones, what vulnerability is represented?

Availability
An attacker repeatedly enters the wrong password for the managers account and has now locked the account. Which category of the CIA triad was compromised?

Confidentiality
A malicious user was able to perform a password brute force attack on a human resource email account and is now reading through all their emails. Which category of the CIA triad was compromised?

Confidentiality
As you are reading a confidential email, a coworker is looking over your shoulder at the email. Which category of the CIA triad was compromised?

Integrity
An unauthorized user was able to change some of the data in an accounting department’s excel spreadsheet. Which category of the CIA triad was compromised?

Availability
An attacker was able to perform a denial-of-service attack on the email server and now users are unable to retrieve their emails. Which category of the CIA triad was compromised?

Spoofing
What type of exploit is occurring when an attacker attempts to hide their identity while communicating on a network?

Red
Sam was just hired to work on the security team that will be attempting to compromise the company’s network to discover what vulnerability exist. Which team did he get hired to?

False
Attackers that choose to perform malicious attacks for profit are called white hat hackers.

Vulnerability Testers
Who uses Nessus software to scan servers and network devices for known vulnerabilities?

Buffer Overflow
When an attacker is inserting text that is too large to fit within a region of memory, what type of attack are they trying to perform?

Weak Passwork
A user is setting up his new work account and sets his password to password01 so he can easily remember it. What type of vulnerability did his password choice create?

Zero-Day
What type of attack is when the attacker discovers a software vulnerability that does not have a patch?

Nation State Espionage
A third world country has solicited the services of several hackers to perform an attack on the U.S. treasury department. Which time of attack would this be classified as?

Script Kiddie
I have very little IT experience but decide to use an advanced hacking tool to perform a denial-of-service attack on banks network. What type of attacker would I be considered?

Insider Threat
A user is upset that he has just been fired and decides to perform a ping flood attack on the email server. What type of attacker would this user be considered?

SQL Injection
Which attack allows an attacker to take control of a database by inserting special commands into input boxes instead of the intended data?

Default Password
An administrator takes a new firewall out of the box and plugs it into the network without making any changes. What type of vulnerability did this create?

ARP Poisoning
If an attacker was able to make changes to the computers cache of IP address to MAC address mapping, which type of attack has occured?

Wiretapping
Which exploit includes using breaching the network cable and using a packet sniffer to listen and record the traffic on the network?

A type of software that protects a computer from network attacks
Describe a personal firewall

Symmetric encryption, the same key encrypts and decrypts data; asymmetric encryption, different keys encrypt and decrypt data
What are two types of encryptions?

IDS can detect intrusions; IPS can stop malicious network attacks
What is the best choice that describes the difference between IDS and IPS?

1) A limit is placed on the packets that can enter the network
2) Filters using layer 3 and 4 protocols
What is packet filtering? How does it work?

What did you do?
What phrase represents Accounting the best?

A stateful firewall that compares all inbound traffic to ensure there is an outbound request
A stateful firewalls uses Stateful Packet Inspection to protect the network. How does this type of firewall operate?

Authentication, Authorization, and Accounting
What does AAA stand for?

A server that authenticates and makes request on behalf of another system on the network
What is a proxy server?

Social Engineering
If someone poses as the IT network admin, walks into a building and asks for the receptionist password to provide an update to their computer, what type of attack is this most likely to be?

To prevent access, to create a fake access point of attack, and to gain intelligence to hack the WPA of the network
If a user can simply reconnect during a deauth attack. Why would a hacker use this attack?

The Marine Corps uses serves in Azure to process images and keeps the processed images in a datacenter owned by DoD for use by other branches of military
What is the best scenario for a hybrid cloud solution?

Deploy a VPN (virtual private network) and use a secure tunneling protocol
If you are using an unsecure network and need to login to data you would like to keep secure during transmission, what should you do?

Encryption
For data that is at rest, what is the best method to protect the data?

UDP
An admin wants to look for video/audio in the network traffic logs. Which layer 4 protocol should the admin filter results by?

Using two methods of authentication
MFA protects identities by

1) WEP
2) WPA
3) WPA2
4) WPA3
Place the wireless encryptions in order from the weakest to the strongest

Are you who you say you are?
What phrase represents Authentication best?

What can you do based on who you are?
What phrase represents Authorization the best?

Lock all doors to IT assets, remove default or out of the box passwords, remove all unnecessary logins, keep patches up to date, and audit access
How can a network admin harden hosts and network devices?

Ad hoc and Infrastructure
What are the two wireless infrastructure modes?

A datacenter owned by Hospital.com for Hospital.com employee apps and resources
What is the best example of private cloud?

Application Firewall
A company needs to secure the network using a security system that can inspect the network traffic’s payload to prevent attacks. What type of firewall would you recommend?

VLAN
The term for an ethernet switch is configured to separate traffic into multiple logical networks

Eavesdrop on the traffic sent through the switch
ARP poisoning allows an attacker to

False
Public cloud providers are not responsible for physical security of the server once a tenant has utilized it

sources;

https://www.wgu.edu/

Scroll to Top