WGU C700 Pre-Assessment Secure Network Design Exam (Latest 2023/ 2024) | Real Questions and Verified Answers | A Grade
WGU C700 Pre-Assessment Secure Network
Design Exam (Latest 2023/ 2024) | Real
Questions and Verified Answers | A Grade
QUESTION
What should a network administrator do to ensure that the server operating system is up to date?
Install patches
Update default settings
Implement physical security
Limit the use of the root account
Answer:
Install patches
QUESTION
Which form of firewall control is implemented at the Layer 3 level of the OSI model?
Next-generation firewall
Circuit-level gateway firewall
Static packet-filtering firewall
Application-level gateway firewall
Answer:
Static packet-filtering firewall
QUESTION
Which Layer 2 control protocol is implemented to resolve internet protocol (IP) addresses into
media access control (MAC) addresses?
Address resolution protocol (ARP)
Hypertext transfer protocol (HTTP)
Internet message access protocol (IMAP)
Simple network management protocol (SNMP)
Answer:
Address resolution protocol (ARP)
QUESTION
Which Layer 3 firewall can recognize malware applications?
Proxy
Circuit-level
Next-generation
Stateful packet inspection
Answer:
Next-generation
QUESTION
Which access point hardening technology must be used in conjunction with the 802.11i standard
for wireless transmission between the access point and the wireless client host?
Layer 2 switch
Layer 3 switch
Wireless access point
Protected access point
Answer:
Protected access point
QUESTION
Which hardening technique satisfies a policy that requires complete integrity from the download
source for all files downloaded by employees to the organization’s workstations?
Source-based firewall for packet inspection downloads
State-based firewall for packet inspection downloads
Intrusion prevention system (IPS) to quarantine downloaded files until they are approved by an
administrator
Intrusion detection system (IDS) that requires the message-digest algorithm 5 (MD5) or the
secure hash algorithm (SHA) totals from the source
Answer:
Intrusion detection system (IDS) that requires the message-digest algorithm 5 (MD5) or the
secure hash algorithm (SHA) totals from the source
QUESTION
Which hardening technique satisfies a policy that requires complete confidentiality for data
transmission of customer financial data during a web-based purchase transaction that is sent to a
corporate web server from a customer web browser?
Implementing a Kerberos authentication process that is required for customers prior to sending
data
Implementing secure sockets layer (SSL) on the web server that is required for customers prior
to sending data
Requiring customers to use the secure real-time transport protocol to establish a connection with
the web server prior to sending data
Requiring customers to use the challenge handshake authentication protocol to establish a
connection to the web server prior to sending data
Answer:
Implementing secure sockets layer (SSL) on the web server that is required for customers prior
to sending data
QUESTION
Which hardening technique satisfies a policy that requires complete confidentiality for VoIP
communications?
Pretty good privacy (PGP)
Secure sockets layer (SSL)
MIME object security services (MOSS)
Secure real-time transport protocol (SRTP)
Answer:
Secure real-time transport protocol (SRTP)
Powered by https://learnexams.com/search/study?query=