{"id":119921,"date":"2023-09-17T09:40:55","date_gmt":"2023-09-17T09:40:55","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=119921"},"modified":"2023-09-17T09:40:59","modified_gmt":"2023-09-17T09:40:59","slug":"wgu-c700-final-examspre-assessment-secure-network-design-examslatest-2023-2024-updates-bundled-together-real-questions-and-verified-answers-a-grade","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/09\/17\/wgu-c700-final-examspre-assessment-secure-network-design-examslatest-2023-2024-updates-bundled-together-real-questions-and-verified-answers-a-grade\/","title":{"rendered":"WGU C700 Final Exams,Pre-Assessment : Secure Network Design Exams(Latest 2023\/ 2024 UPDATES BUNDLED TOGETHER) | Real Questions and Verified Answers | A Grade"},"content":{"rendered":"\n<p>WGU C700 Pre-Assessment Secure Network<br>Design Exam (Latest 2023\/ 2024) | Real<br>Questions and Verified Answers | A Grade<br>QUESTION<br>What should a network administrator do to ensure that the server operating system is up to date?<br>Install patches<br>Update default settings<br>Implement physical security<br>Limit the use of the root account<br>Answer:<br>Install patches<br>QUESTION<br>Which form of firewall control is implemented at the Layer 3 level of the OSI model?<br>Next-generation firewall<br>Circuit-level gateway firewall<br>Static packet-filtering firewall<br>Application-level gateway firewall<br>Answer:<br>Static packet-filtering firewall<br>QUESTION<br>Which Layer 2 control protocol is implemented to resolve internet protocol (IP) addresses into<br>media access control (MAC) addresses?<br>Address resolution protocol (ARP)<br>Hypertext transfer protocol (HTTP)<br>Internet message access protocol (IMAP)<br>Simple network management protocol (SNMP)<\/p>\n\n\n\n<p>Answer:<br>Address resolution protocol (ARP)<br>QUESTION<br>Which Layer 3 firewall can recognize malware applications?<br>Proxy<br>Circuit-level<br>Next-generation<br>Stateful packet inspection<br>Answer:<br>Next-generation<br>QUESTION<br>Which access point hardening technology must be used in conjunction with the 802.11i standard<br>for wireless transmission between the access point and the wireless client host?<br>Layer 2 switch<br>Layer 3 switch<br>Wireless access point<br>Protected access point<br>Answer:<br>Protected access point<br>QUESTION<br>Which hardening technique satisfies a policy that requires complete integrity from the download<br>source for all files downloaded by employees to the organization&#8217;s workstations?<br>Source-based firewall for packet inspection downloads<br>State-based firewall for packet inspection downloads<br>Intrusion prevention system (IPS) to quarantine downloaded files until they are approved by an<br>administrator<\/p>\n\n\n\n<p>Intrusion detection system (IDS) that requires the message-digest algorithm 5 (MD5) or the<br>secure hash algorithm (SHA) totals from the source<br>Answer:<br>Intrusion detection system (IDS) that requires the message-digest algorithm 5 (MD5) or the<br>secure hash algorithm (SHA) totals from the source<br>QUESTION<br>Which hardening technique satisfies a policy that requires complete confidentiality for data<br>transmission of customer financial data during a web-based purchase transaction that is sent to a<br>corporate web server from a customer web browser?<br>Implementing a Kerberos authentication process that is required for customers prior to sending<br>data<br>Implementing secure sockets layer (SSL) on the web server that is required for customers prior<br>to sending data<br>Requiring customers to use the secure real-time transport protocol to establish a connection with<br>the web server prior to sending data<br>Requiring customers to use the challenge handshake authentication protocol to establish a<br>connection to the web server prior to sending data<br>Answer:<br>Implementing secure sockets layer (SSL) on the web server that is required for customers prior<br>to sending data<br>QUESTION<br>Which hardening technique satisfies a policy that requires complete confidentiality for VoIP<br>communications?<br>Pretty good privacy (PGP)<br>Secure sockets layer (SSL)<br>MIME object security services (MOSS)<br>Secure real-time transport protocol (SRTP)<br>Answer:<br>Secure real-time transport protocol (SRTP)<\/p>\n\n\n\n<p>WGU C700 Secure Network Exam Design<br>(Latest 2023\/ 2024) | Actual Questions and<br>Verified Answers | A Grade<br>QUESTION<br>A device on a network is pinging over 100 endpoints on the infrastructure. The IP and MAC<br>addresses belong to the network management system. How- ever, the MAC address has been<br>spoofed. The machine is tracked down, and<br>it is an unknown rogue device that somehow got past the network admission control (NAC)<br>device.<br>Which action should be taken from this point forward?<br>Answer:<br>Contain and unplug this device from the network.<br>QUESTION<br>A network has been subjected to a series of simple yet aggressive attacks for a number of weeks.<br>The company&#8217;s leadership and security team want to know the type of information the attacker is<br>searching for, and the ways in which the attacker has been successful.<br>What are three methods that should be used to research the attacker&#8217;s inten- tions and<br>capabilities?<br>Choose 3 answers<br>Answer:<br>Honeynet<br>Padded cell<br>Honeypot<br>QUESTION<br>An alarm has been triggered based on the Intrusion Detection System (IDS) thresholds on a<br>company&#8217;s main operational network. An immediate analy- sis of the IDS logs shows an intruder<br>successfully breached the perimeter network defenses and began data exfiltration. Although the<br>network security<\/p>\n\n\n\n<p>administrator managed to lock out the intruder and deny access from the source, the company<br>must now go into &#8220;incident response&#8221; mode.<br>Which three goals should the administrator accomplish as quickly as possi- ble?<br>Choose 3 answers<br>Answer:<br>Minimize operational and network downtime. Restore the environment back to a secured normal<br>state.<br>Minimize loss (e.g., financial, reputational, data, intellectual property).<br>QUESTION<br>An application server was recently attacked, resulting in compromise of all transactional credit<br>card information via the website. It was revealed that the attacker was able to compromise a<br>system administrator&#8217;s computer via a spear phishing attack. This gave the attacker the ability to<br>compromise the application server.<br>Which network security management practice should be applied to treat these operational<br>weaknesses?<br>Answer:<br>Increase training of information technology staff on the dangers of social engineering.<br>QUESTION<br>An attacker compromises an Internet-facing web server. The attacker then uses the compromised<br>web server to gain unauthorized access to other internal servers.<br>Which control or design consideration prevents exploitation of the internal network?<br>Answer:<br>Demilitarized zone<br>QUESTION<\/p>\n\n\n\n<p>Recently, a company experienced several malware infections. Though the virus scanners have<br>been regularly updated, re-infections happen regularly. An investigation of the infected PCs<br>shows that several critical OS files have not been updated in more than a year.<br>Which two strategies should the company deploy in the future to detect and minimize the<br>possibility of this kind of infection?<br>Choose 2 answers<br>Answer:<br>Vulnerability assessments<br>Patch management<br>QUESTION<br>Company A has established a business partnership with Company B. Company A and Company<br>B need to securely interconnect their networks, while minimally impacting the end-user<br>experience.<br>How should access to these two networks be granted?<br>Answer:<br>Site-to-site VPN<br>QUESTION<br>A company&#8217;s chief information officer (CIO) has tasked the network secu- rity team with a set of<br>requirements for the next iteration of network security. The CIO wants a solution that will<br>implement the following items:<br>Access control<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Connectionless data integrity checking<\/li>\n\n\n\n<li>Data origin authentication<\/li>\n\n\n\n<li>Replay detection and rejection<\/li>\n\n\n\n<li>Confidentiality using encryption<\/li>\n\n\n\n<li>Traffic flow confidentiality<\/li>\n\n\n\n<li>What provides this set of services?<br>Answer:<br>Internet Protocol Security (IPSec)<\/li>\n<\/ul>\n\n\n\n<p>WGU C700 Secure Network Design Exam<br>Practice (Latest 2023\/ 2024) | Questions and<br>Verified Answers | 100% Correct<br>QUESTION<br>On a TCP\/IP network, there are over \u2026\u2026\u2026\u2026\u2026\u2026. ports that are vulnerable.<br>Answer:<br>65,000<br>QUESTION<br>The first \u2026\u2026\u2026\u2026\u2026\u2026. ports are the well-known ports<br>Answer:<br>1,024<br>QUESTION<br>The first 1,024 ports are the \u2026\u2026\u2026\u2026\u2026\u2026. ports<br>Answer:<br>well-known<br>QUESTION<br>An Active Hub Is On the \u2026\u2026\u2026\u2026\u2026. OSI Layer<br>Answer:<br>Physical<\/p>\n\n\n\n<p>QUESTION<br>Active hub has what?<br>Answer:<br>regeneration<br>QUESTION<br>passive hub doesn&#8217;t have what?<br>Answer:<br>regeneration<br>QUESTION<br>Flow control, error notification, physical device addressing, and specification of the networking<br>topology can take place at the \u2026\u2026\u2026\u2026\u2026\u2026. layer<br>Answer:<br>Data-link<br>QUESTION<br>An \u2026\u2026\u2026\u2026\u2026\u2026. is an access control method that limits the paths through which a user can access<br>resources<br>Answer:<br>enforced path<br>QUESTION<br>An enforced path is an access control method that<br>Answer:<br>limits the paths through which a user can access resources<\/p>\n\n\n\n<p>QUESTION<br>A \u2026\u2026\u2026\u2026\u2026\u2026. is a mechanism that allows a user to communicate with the trusted computing<br>base (TCB).<br>Answer:<br>trusted path<br>QUESTION<br>A trusted path is a mechanism that allows a user to communicate with \u2026\u2026\u2026\u2026\u2026\u2026.<br>Answer:<br>the trusted computing base (TCB).<br>QUESTION<br>A \u2026\u2026\u2026\u2026\u2026\u2026. is a set of resources that are managed by the same security policy and security<br>group<br>Answer:<br>security domain<br>QUESTION<br>A security domain is a set of resources that are managed by the \u2026\u2026\u2026\u2026\u2026\u2026.<br>Answer:<br>same security policy and security group<br>QUESTION<br>\u2026\u2026\u2026\u2026\u2026\u2026. is the hardware, firmware, and software resources of a TCB.<br>Answer:<\/p>\n\n\n\n<p>A security kernel<br>QUESTION<br>A security kernel is the hardware, firmware, and software resources of a<br>Answer:<br>trusted computing base (TCB)<br>QUESTION<br>The \u2026\u2026\u2026\u2026\u2026\u2026. copies a frame&#8217;s destination address to the switch&#8217;s buffer and then sends the<br>frame to its destination.<br>Answer:<br>cut-through method<br>QUESTION<br>The cut-through method copies a frame&#8217;s \u2026\u2026\u2026\u2026\u2026. to the switch&#8217;s buffer and then sends the<br>frame to its destination.<br>Answer:<br>destination address<br>QUESTION<br>The \u2026\u2026\u2026\u2026\u2026\u2026. method copies an entire frame to its buffer,<br>Answer:<br>store-and-forward<br>QUESTION<br>The store-and-forward method copies an \u2026\u2026\u2026\u2026\u2026\u2026. to its buffer,<\/p>\n\n\n\n<p>WGU C700 Secure Network Design Exam<br>(Latest 2023\/ 2024) | Actual Questions and<br>Verified Answers | A Grade<br>QUESTION<br>You are configuring a computer to connect to the Internet. Which information must a computer<br>on a network have before it can communicate with the Internet?<br>Answer:<br>the IP address, default gateway, and subnet mask<br>QUESTION<br>You must propose a cabling scheme for your company&#8217;s new location. Several departments are<br>located on the same floor with a maximum distance of 61 meters (200 feet) between<br>departments. You want a relatively easy, low-cost installation with simple connections.<br>Which type of cabling would you propose?<br>Answer:<br>Twisted-pair<br>QUESTION<br>Which layer of the TCP\/IP model corresponds to the Transport layer of the OSI model?<br>Answer:<br>Transport<br>QUESTION<br>Which unshielded twisted-pair (UTP) category consists of four twisted pairs of copper wire and<br>is certified for transmission rates of up to 100 Mbps?<\/p>\n\n\n\n<p>Answer:<br>Category 5<br>QUESTION<br>You are preparing to perform routine maintenance on the network. The network must remain<br>inaccessible while you are performing this maintenance. You send a message with the packet<br>header 135.135.255.255.<br>Answer:<br>It broadcasts your message to all stations on the 135.135 network.<br>QUESTION<br>Which notation is the network prefix that is used to denote an unsubnetted Class C IP address?<br>Answer:<br>\/8<br>QUESTION<br>What should you use to connect a computer to a 100BaseTX Fast Ethernet network?<br>Answer:<br>Use a CAT5 UTP cable with an RJ-45 connector.<br>QUESTION<br>Which device converts messages between two dissimilar electronic mail (e-mail) applications?<br>Answer:<br>e-mail gateway<br>QUESTION<br>Which characteristics apply to Fast Ethernet 100Base-TX networks?<\/p>\n\n\n\n<p>100 Mbps data-transmission rate<br>Two pairs of Category 5 UTP cabling<br>Four pairs of Category 3, 4, or 5 UTP cabling<br>Maximum segment length of 100 meters (328 feet)<br>Maximum segment length of 412 meters (1,352 feet) half-duplex<br>Answer:<br>100 Mps data-transmission rate<br>Two pairs of Cat 5 UTP cabling<br>Max segment length of 100m<br>QUESTION<br>You are deploying a virtual private network (VPN) for remote users. You have decided to deploy<br>the VPN gateway in its own demilitarized zone (DMZ) behind the external firewall. What are the<br>benefits of this deployment?<br>Answer:<br>The firewall can protect the VPN gateway and inspect plain text from the VPN<br>QUESTION<br>You are servicing a Windows computer that is connected to your company&#8217;s Ethernet network.<br>You need to determine the manufacturer of the computer&#8217;s NIC. You issue the ipconfig \/all<br>command in the command prompt window and record the NIC&#8217;s MAC address, which is 00-20-<br>AF-D3-03-1B.<br>Which part of the MAC address will help you to determine the NIC&#8217;s manufacturer?<br>Answer:<br>00-20-AF<br>QUESTION<br>Which cable type is vulnerable to the use of vampire taps?<br>Answer:<\/p>\n\n\n\n<p>Coaxial<br>QUESTION<br>What is the base network ID for the address 196.11.200.71\/18?<br>Answer:<br>196.11.192.0<br>QUESTION<br>You administer a TCP\/IP network that is not subnetted. One of the network hosts has the<br>following IP address: 130.250.0.10. Which IP address is the network ID of the network you<br>administer?<br>Answer:<br>130.250.0.0<br>QUESTION<br>You want to use the IANA-designated private IP address range that private IP address range with<br>a maximum of 16 bits to provide host IP addresses.<br>Which IP address is a valid host IP address in this range?<br>Answer:<br>192.168.0.1<br>QUESTION<br>You are a consultant. One of your clients has asked you to establish network hosts for its<br>network. This network is connected to the Internet.What is the maximum number of hosts that<br>this company can have with a network address of 208.15.208.0 using the default subnet mask?<br>Answer:<br>254<\/p>\n","protected":false},"excerpt":{"rendered":"<p>WGU C700 Pre-Assessment Secure NetworkDesign Exam (Latest 2023\/ 2024) | RealQuestions and Verified Answers | A GradeQUESTIONWhat should a network administrator do to ensure that the server operating system is up to date?Install patchesUpdate default settingsImplement physical securityLimit the use of the root accountAnswer:Install patchesQUESTIONWhich form of firewall control is implemented at the Layer 3 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-119921","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/119921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=119921"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/119921\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=119921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=119921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=119921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}