{"id":117019,"date":"2023-08-27T10:48:23","date_gmt":"2023-08-27T10:48:23","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=117019"},"modified":"2023-08-27T10:48:26","modified_gmt":"2023-08-27T10:48:26","slug":"wgu-c700-secure-network-design-wgu-c700-pre-assessment-secure-network-design-2023-2024-exams-study-bundle-with-complete-soluions-actual-questions-and-verified-answers-a-grade","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/08\/27\/wgu-c700-secure-network-design-wgu-c700-pre-assessment-secure-network-design-2023-2024-exams-study-bundle-with-complete-soluions-actual-questions-and-verified-answers-a-grade\/","title":{"rendered":"WGU C700 Secure Network Design\/ WGU C700 Pre-Assessment Secure Network Design 2023\/ 2024 Exams STUDY BUNDLE WITH COMPLETE SOLUIONS | Actual Questions and Verified Answers | A Grade"},"content":{"rendered":"\n<p>WGU C700 Pre-Assessment Secure Network<br>Design 2023\/ 2024 Exam | Actual Exam<br>Questions and Verified Answers | A Grade<br>Q: Which protocol provides background security support services for IPSec by negotiating,<br>establishing, modifying, and deleting security associations?<br>Secure sockets layer (SSL)<br>Transport layer security (TLS)<br>Internet small computer system interface (iSCSI)<br>Internet security association and key management protocol (ISAKMP)<br>Answer:<br>Internet security association and key management protocol (ISAKMP)<br>Q: A company needs to securely connect a client with the company&#8217;s server. The security is<br>handled by the two hosts and the traffic carried belongs only to the two hosts.<br>Which interconnection provision should be used between this server and this client?<br>Site-to-site virtual private network (VPN)<br>Host-to-site virtual private network (VPN)<br>Host-to-host virtual private network (VPN)<br>Remote access virtual private network (VPN)<br>Answer:<br>Host-to-host virtual private network (VPN)<br>Q: Two partnering companies are interested in connecting their respective IPSec gateways<br>through a secure connection.<br>Which interconnection is needed to meet this goal?<br>Site-to-site virtual private network (VPN)<br>Site-to-host virtual private network (VPN)<\/p>\n\n\n\n<p>Host-to-site virtual private network (VPN)<br>Host-to-host virtual private network (VPN)<br>Answer:<br>Site-to-site virtual private network (VPN)<br>Q: An organization is interested in implementing a virtual private network (VPN) that will<br>extend the company&#8217;s network to all the branches.<br>What is the appropriate VPN technology to deploy?<br>VPN router<br>VPN gateway<br>Site-to-site VPN<br>Host-to-site VPN<br>Answer:<br>Site-to-site VPN<br>Q: A network administrator needs to maintain a list of destination networks along with metrics<br>of direction using a protocol service that operates at the network layer.<br>Which protocol should be used?<br>Secure sockets layer (SSL)<br>Point-to-point protocol (PPP)<br>Remote procedure call (RPC)<br>Routing information protocol (RIP)<br>Answer:<br>Routing information protocol (RIP)<br>Q: A network administrator is implementing a new virtual private network (VPN) for an<br>organization. The administrator needs to use a tunneling protocol that protects transmitted traffic<br>and supports the transmission of multiple protocols at the data link layer in the OSI model.<\/p>\n\n\n\n<p>Which protocol should be used?<br>Layer 2 forwarding (L2F)<br>Layer 2 tunneling protocol (L2TP)<br>Internet protocol security (IPSec)<br>Point-to-point tunneling protocol (PPTP)<br>Answer:<br>Layer 2 tunneling protocol (L2TP)<br>Q: An institution is using a network application that supports an exchange of files.<br>Which application layer protocol should be used?<br>File transfer protocol (FTP)<br>Remote procedure call (RPC)<br>Border gateway protocol (BGP)<br>Structured query language (SQL)<br>Answer:<br>File transfer protocol (FTP)<br>Q: A school uses a link state routing protocol at the network layer to maintain a topography<br>map of all connected networks.<br>Which protocol should be used?<br>Open shortest path first (OSPF)<br>Routing information protocol (RIP)<br>Interior gateway routing protocol (IGRP)<br>Enhanced interior gateway routing protocol (EIGRP)<br>Answer:<br>Open shortest path first (OSPF)<\/p>\n\n\n\n<p>WGU C700 Secure Network Design 2023\/<br>2024 Exam | Actual Questions and Verified<br>Answers | A Grade<br>Q: Which OSI process ensures that each OSI layer at the sender adds its own information to the<br>packet and each OSI layer at the receiver strips off its corresponding information?<br>Answer:<br>encapsulation<br>Q: Your network contains four segments. Which network devices can you use to connect two or<br>more of the LAN segments together?<br>Answer:<br>Router<br>Switch<br>Bridge<br>Q: Your manager has asked you to improve network security by confining sensitive internal<br>data traffic to computers on a specific subnet using access control lists (ACLs). Where should the<br>ACLs be deployed?<br>Answer:<br>Routers<br>Q: Which protocols operate at the Transport layer of the OSI model?<br>Answer:<br>TCP<br>UDP<\/p>\n\n\n\n<p>Q: In your organization&#8217;s Windows network, you have implemented policies that allow users to<br>only log in to the network from certain workstations. What concept does this action represent?<br>Answer:<br>Enforced path<br>Q: You need to solve a traffic problem occurring on a large Ethernet network. Within this large<br>segment, the accounting department is flooding the network with a high volume of data, which<br>causes the entire network to slow down.<br>Which device is a quick and low-cost solution to isolating the accounting department?<br>Answer:<br>bridge<br>Q: You manage the security for a small corporate network that includes a hub and firewall. You<br>want to provide protection against traffic sniffing. What should you do?<br>Answer:<br>Replace the hub with a switch.<br>Q: Which type of firewall hides a packet&#8217;s true origin before sending it through another<br>network?<br>Answer:<br>proxy firewall<br>Q: What are the key functions of the OSI Network layer?<br>Answer:<\/p>\n\n\n\n<p>Path selection<br>Logical addressing<br>Q: At which layer of the OSI model do routers operate?<br>Answer:<br>Network<br>Q: Which function does the Session layer of the OSI model provide?<br>Answer:<br>data synchronization<br>Q: Which network device or component ensures that the computers on the network meet an<br>organization&#8217;s security policies?<br>Answer:<br>NAC<br>Q: Which network device provides a transparent firewall solution between an internal network<br>and outside networks?<br>Answer:<br>NAT router<br>Q: Which network device acts as an Internet gateway, firewall, and Internet caching server for a<br>private network?<br>Answer:<br>proxy server<\/p>\n\n\n\n<p>Q: Which media-access method does the 802.11 standard specify for wireless networks?<br>Answer:<br>CSMA\/CA<br>Q: Which network entity uses one public IP address and acts as the interface between a local<br>area network and the Internet?<br>Answer:<br>NAT<br>Q: Which radio transmission technology does the 802.11b standard specify?<br>Answer:<br>direct sequence spread spectrum (DSSS)<br>Q: You are configuring a computer to connect to the Internet. Which information must a<br>computer on a network have before it can communicate with the Internet?<br>Answer:<br>the IP address, default gateway, and subnet mask<br>Q: You are designing an Ethernet network. The Ethernet specification you select for the<br>network should support a data transmission rate of 100 megabits per second (Mbps) and a<br>maximum cable segment length of 2,000 meters (m). The cable used in the Ethernet specification<br>you select should also be immune to crosstalk.<br>Which Ethernet specification should you use on the network?<\/p>\n\n\n\n<p>WGU C700 Secure Network Design 2023\/<br>2024 Exam Prep| Questions and Verified<br>Answers | 100% Correct<br>Q: An active hub has circuitry that allows<br>Answer:<br>signal regeneration<br>Q: In a \u2026\u2026\u2026\u2026\u2026. topology, cabling termination errors can crash the entire network.<br>Answer:<br>star-wired<br>Q: In a star-wired topology, \u2026\u2026\u2026\u2026\u2026\u2026. errors can crash the entire network.<br>Answer:<br>cabling termination<br>Q: A passive hub connects devices in a \u2026\u2026\u2026\u2026\u2026., but it does not provide any signal<br>regeneration.<br>Answer:<br>star topology<br>Q: \u2026\u2026\u2026\u2026\u2026\u2026. is classified as a rule-based access control device.<\/p>\n\n\n\n<p>Answer:<br>A firewall<br>Q: A firewall is classified as \u2026\u2026\u2026\u2026\u2026\u2026. access control device.<br>Answer:<br>a rule-based<br>Q: Behavior-based IDS &#8211;<br>Answer:<br>An IDS that uses a learned activity baseline to identify intrusion attempts<br>Q: Signature-based IDS &#8211;<br>Answer:<br>An IDS that maintains an attack profile database to identify intrusion attempts<br>Q: Host-based IDS &#8211;<br>Answer:<br>An IDS that only monitors a single particular device for intrusion attempts<br>Q: Network-based IDS &#8211;<br>Answer:<br>An IDS that monitors an entire network segment for intrusion attempts<\/p>\n\n\n\n<p>Q: an \u2026\u2026\u2026\u2026\u2026\u2026. only detects intrusion attempts and employs the configured alerts to ensure<br>that the intrusion attempts is recorded and reported<br>Answer:<br>IDS<br>Q: Ethernet II frames include \u2026\u2026\u2026\u2026\u2026\u2026. byte Type field.<br>Answer:<br>a twoQ: \u2026\u2026\u2026\u2026\u2026. frames include a two-byte Type field.<br>Answer:<br>Ethernet II<br>Q: Ethernet II frames include a two-byte \u2026\u2026\u2026\u2026\u2026\u2026. field.<br>Answer:<br>Type<br>Q: The two-byte length field is included in frames.<br>Answer:<br>802.3<br>Q: The 802.1Q tag, is the \u2026\u2026\u2026\u2026\u2026\u2026. tag<\/p>\n\n\n\n<p>Answer:<br>virtual LAN (VLAN)<br>Q: Both Versions 1 and 2 of \u2026\u2026\u2026\u2026\u2026\u2026. use hop count as the primary metric to determine the<br>most desirable network path<br>Answer:<br>RIP<br>Q: of RIP use hop count as the primary metric to determine the most desirable network path<br>Answer:<br>Both Versions 1 and 2<br>Q: Convergence refers to<br>Answer:<br>the amount of time it takes for routing updates to be propagated to all routers throughout the<br>network.<br>Q: RIP v1, RIP v2, and IGRP are considered<br>Answer:<br>distance vector protocols.<br>Q: Open Shortest Path First (OSPF) is a \u2026\u2026\u2026\u2026\u2026\u2026. protocol.<br>Answer:<br>link-state<\/p>\n\n\n\n<p>WGU C700 Secure Network Design 2023\/<br>2024 Exam | Real Questions and Verified<br>Answers | A Grade<br>Q: As a fundamental concept of network security, backups are vital to incident recovery. A<br>security administrator has been tasked with reporting on the pros and cons of various<br>backup\/recovery technologies and is preparing a list of these technologies<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Online storage<\/li>\n\n\n\n<li>Offsite storage<\/li>\n\n\n\n<li>Onsite storage<br>Match the advantages and disadvantages with each backup\/recovery technol- ogy to assist the<br>security administrator.<\/li>\n\n\n\n<li>Offers access to data from any Internet connection<\/li>\n\n\n\n<li>Better option when faced with possible major catastrophes affecting connec- tivity<\/li>\n\n\n\n<li>Provides for quick recoveries while controlling the physical\/logical informa- tion<\/li>\n\n\n\n<li>Puts data on someone else&#8217;s hardware<\/li>\n\n\n\n<li>Requires rented\/leased space for storage<\/li>\n\n\n\n<li>Subject to physical threats under the organizations control<br>Answer:<\/li>\n\n\n\n<li>Offers access to data from any Internet connection : online storage<\/li>\n\n\n\n<li>Better option when faced with possible major catastrophes affecting connectivity:<br>offsite storage<\/li>\n\n\n\n<li>Provides for quick recoveries while controlling the physical\/logical information: Onsite storage<\/li>\n\n\n\n<li>Puts data on someone else&#8217;s hardware: Online storage<\/li>\n\n\n\n<li>Requires rented\/leased space for storage: Offsite storage<\/li>\n\n\n\n<li>Subject to physical threats under the organizations control: Onsite storage<br>Q: A company is concerned about employee usernames and passwords be- ing obtained through<br>phishing campaigns.<br>Which emerging technology should the company employ to keep this from happening?<br>Answer:<br>Tokens<\/li>\n<\/ul>\n\n\n\n<p>Q: Which method could be used to protect against data leakage?<br>Answer:<br>Deep con- tent inspection<br>Q: A large organization will be heavily dependent on a number of in-house web services that<br>are Internet-facing.<br>Which control should be used by this organization to protect against Inter- net-based attackers?<br>Answer:<br>Application firewall<br>Q: A security administrator has decided that it is important to simplify the management of<br>many of the edge security devices through a single web in- terface. The administrator decides to<br>purchase a replacement security device that can filter common website attacks, allow users<br>remote access to their network resources, and scan emails for malware.<br>What should the administrator deploy to meet these goals?<br>Answer:<br>Hybrid firewall<br>Q: Recently, many organizations are embracing Bring Your Own Device<br>(BYOD) as a means to reduce cost.<br>What is the primary reason these organizations must ensure malware detec- tion remains a top<br>priority?<br>Answer:<br>To protect the organization from attacks introduced by the lack of a perimeter<br>Q: A security administrator has recently subscribed to online threat feeds that discuss continual<br>security improvement, better log visibility, and improved risk mitigation techniques.<\/p>\n\n\n\n<p>Which explanation should be given as the reason for improving continuous detection processes<br>in these discussions?<br>Answer:<br>New vulnerabilities are identified every day, and as such networks need to adapt<br>Q: A company is in the process of separating valid network traffic from malicious traffic.<br>Currently, the company does not want to block valid traffic that would cause an outage to an<br>application.<br>Which device will monitor and classify potential malicious traffic to improve current policies?<br>Answer:<br>Intrusion Detection System (IDS)<br>Q: What are two security controls that are applicable to the LAN-to-WAN<br>domain?<br>Choose 2 answers<br>Answer:<br>Proxy server<br>Stateful packet inspection<br>Q: A company&#8217;s chief executive officer (CEO) is traveling overseas for a business meeting and<br>wants to protect emails and video conference calls from a breach in confidentiality.<br>Which strategy should be used to achieve this objective?<br>Answer:<br>Secure a VPN back into the corporate offices.<br>Q: An enterprise environment has multiple stakeholders, each of whom has a unique role,<br>responsibility, and level of access.<br>What is a cost-effective method of segmenting the network for this environ- ment?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>WGU C700 Pre-Assessment Secure NetworkDesign 2023\/ 2024 Exam | Actual ExamQuestions and Verified Answers | A GradeQ: Which protocol provides background security support services for IPSec by negotiating,establishing, modifying, and deleting security associations?Secure sockets layer (SSL)Transport layer security (TLS)Internet small computer system interface (iSCSI)Internet security association and key management protocol (ISAKMP)Answer:Internet security association and key [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-117019","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/117019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=117019"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/117019\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=117019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=117019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=117019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}