WGU C700 Secure Network Exam Design (Latest 2023/ 2024) | Actual Questions and Verified Answers | A Grade
WGU C700 Secure Network Exam Design
(Latest 2023/ 2024) | Actual Questions and
Verified Answers | A Grade
QUESTION
A device on a network is pinging over 100 endpoints on the infrastructure. The IP and MAC
addresses belong to the network management system. How- ever, the MAC address has been
spoofed. The machine is tracked down, and
it is an unknown rogue device that somehow got past the network admission control (NAC)
device.
Which action should be taken from this point forward?
Answer:
Contain and unplug this device from the network.
QUESTION
A network has been subjected to a series of simple yet aggressive attacks for a number of weeks.
The company’s leadership and security team want to know the type of information the attacker is
searching for, and the ways in which the attacker has been successful.
What are three methods that should be used to research the attacker’s inten- tions and
capabilities?
Choose 3 answers
Answer:
Honeynet
Padded cell
Honeypot
QUESTION
An alarm has been triggered based on the Intrusion Detection System (IDS) thresholds on a
company’s main operational network. An immediate analy- sis of the IDS logs shows an intruder
successfully breached the perimeter network defenses and began data exfiltration. Although the
network security
administrator managed to lock out the intruder and deny access from the source, the company
must now go into “incident response” mode.
Which three goals should the administrator accomplish as quickly as possi- ble?
Choose 3 answers
Answer:
Minimize operational and network downtime. Restore the environment back to a secured normal
state.
Minimize loss (e.g., financial, reputational, data, intellectual property).
QUESTION
An application server was recently attacked, resulting in compromise of all transactional credit
card information via the website. It was revealed that the attacker was able to compromise a
system administrator’s computer via a spear phishing attack. This gave the attacker the ability to
compromise the application server.
Which network security management practice should be applied to treat these operational
weaknesses?
Answer:
Increase training of information technology staff on the dangers of social engineering.
QUESTION
An attacker compromises an Internet-facing web server. The attacker then uses the compromised
web server to gain unauthorized access to other internal servers.
Which control or design consideration prevents exploitation of the internal network?
Answer:
Demilitarized zone
QUESTION
Recently, a company experienced several malware infections. Though the virus scanners have
been regularly updated, re-infections happen regularly. An investigation of the infected PCs
shows that several critical OS files have not been updated in more than a year.
Which two strategies should the company deploy in the future to detect and minimize the
possibility of this kind of infection?
Choose 2 answers
Answer:
Vulnerability assessments
Patch management
QUESTION
Company A has established a business partnership with Company B. Company A and Company
B need to securely interconnect their networks, while minimally impacting the end-user
experience.
How should access to these two networks be granted?
Answer:
Site-to-site VPN
QUESTION
A company’s chief information officer (CIO) has tasked the network secu- rity team with a set of
requirements for the next iteration of network security. The CIO wants a solution that will
implement the following items:
Access control
- Connectionless data integrity checking
- Data origin authentication
- Replay detection and rejection
- Confidentiality using encryption
- Traffic flow confidentiality
- What provides this set of services?
Answer:
Internet Protocol Security (IPSec)
Powered by https://learnexams.com/search/study?query=