{"id":130824,"date":"2023-12-22T06:07:39","date_gmt":"2023-12-22T06:07:39","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=130824"},"modified":"2023-12-22T06:07:42","modified_gmt":"2023-12-22T06:07:42","slug":"wgu-c172-objective-assessment-exam-latest-2023-2024-update-network-and-security-foundations-questions-and-verified-answers-100-correct-grade-a","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/12\/22\/wgu-c172-objective-assessment-exam-latest-2023-2024-update-network-and-security-foundations-questions-and-verified-answers-100-correct-grade-a\/","title":{"rendered":"WGU C172 Objective Assessment Exam (Latest 2023\/ 2024 Update) Network and Security Foundations| Questions and Verified Answers| 100% Correct |Grade A"},"content":{"rendered":"\n<p>WGU C172 Objective Assessment Exam (Latest 2023\/ 2024 Update) Network and Security Foundations| Questions and Verified Answers| 100% Correct |Grade A<\/p>\n\n\n\n<p>WGU C172 Objective Assessment Exam<br>(Latest 2023\/ 2024 Update) Network and<br>Security Foundations| Questions and Verified<br>Answers| 100% Correct |Grade A<br>Q: If someone poses as the IT network admin, walks into a building and asks for the<br>receptionist password to provide an update to their computer, what type of attack is this most<br>likely to be?<br>Answer:<br>Social engineering<br>Q: The two wireless infrastructure modes<br>Answer:<br>Ad hoc, infrastructure<br>Q: What is a proxy server?<br>Answer:<br>A server that authenticates and makes request on behalf of another system on the network<br>Q: An admin wants to look for video\/audio in the network traffic logs. Which layer 4 protocol<br>should the admin filter results by?<br>Answer:<br>UDP<\/p>\n\n\n\n<p>Q: What is the best scenario for a hybrid cloud solution?<br>Answer:<br>The Marine Corps uses servers in Azure to process images and keeps the processed images in a<br>datacenter owned by DoD for use by other branches of military.<br>Q: Describe a personal firewall<br>Answer:<br>A type of software that protects a computer from network attacks<br>Q: If you are using an unsecure network and need to login to data you would like keep secure<br>during transmission what should you do?<br>Answer:<br>Deploy a VPN (Virtual Private Network) and use a secure tunneling protocol<br>Q: How can a network admin harden hosts and network devices?<br>Answer:<br>Lock all doors to IT assets<br>Remove default or out of the box passwords.<br>Remove all unnecessary logins<br>Keep patches up to date<br>Audit Access<br>Q: ARP Poisoning allows an attacker to<br>Answer:<br>Eavesdrop on the traffic sent through the Switch<br>Powered by <a href=\"https:\/\/learnexams.com\/search\/study?query=\" target=\"_blank\" rel=\"noopener\">https:\/\/learnexams.com\/search\/study?query=<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/learnexams.com\/search\/study?query=\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/12\/wgu-c172-objective-assessment-exam-latest-2023-2024-update-network-and-security-foundations-questions-and-verified-answers-100-correct-grade-a-725x1024.png\" alt=\"\" class=\"wp-image-130825\"\/><\/a><\/figure>\n\n\n\n<p>Phishing<br>Which type of attack sends emails claiming to be your bank and asking you to verify that your username and password are correct?<\/p>\n\n\n\n<p>Port Scanning<br>A <em>__<\/em> attack sends TCP\/IP traffic to each and every port to learn which services are running<\/p>\n\n\n\n<p>BYOD\/mobile<br>When a company allows it users to access company resources through their personal cell phones, what vulnerability is represented?<\/p>\n\n\n\n<p>Availability<br>An attacker repeatedly enters the wrong password for the managers account and has now locked the account. Which category of the CIA triad was compromised?<\/p>\n\n\n\n<p>Confidentiality<br>A malicious user was able to perform a password brute force attack on a human resource email account and is now reading through all their emails. Which category of the CIA triad was compromised?<\/p>\n\n\n\n<p>Confidentiality<br>As you are reading a confidential email, a coworker is looking over your shoulder at the email. Which category of the CIA triad was compromised?<\/p>\n\n\n\n<p>Integrity<br>An unauthorized user was able to change some of the data in an accounting department&#8217;s excel spreadsheet. Which category of the CIA triad was compromised?<\/p>\n\n\n\n<p>Availability<br>An attacker was able to perform a denial-of-service attack on the email server and now users are unable to retrieve their emails. Which category of the CIA triad was compromised?<\/p>\n\n\n\n<p>Spoofing<br>What type of exploit is occurring when an attacker attempts to hide their identity while communicating on a network?<\/p>\n\n\n\n<p>Red<br>Sam was just hired to work on the security team that will be attempting to compromise the company&#8217;s network to discover what vulnerability exist. Which team did he get hired to?<\/p>\n\n\n\n<p>False<br>Attackers that choose to perform malicious attacks for profit are called white hat hackers.<\/p>\n\n\n\n<p>Vulnerability Testers<br>Who uses Nessus software to scan servers and network devices for known vulnerabilities?<\/p>\n\n\n\n<p>Buffer Overflow<br>When an attacker is inserting text that is too large to fit within a region of memory, what type of attack are they trying to perform?<\/p>\n\n\n\n<p>Weak Passwork<br>A user is setting up his new work account and sets his password to password01 so he can easily remember it. What type of vulnerability did his password choice create?<\/p>\n\n\n\n<p>Zero-Day<br>What type of attack is when the attacker discovers a software vulnerability that does not have a patch?<\/p>\n\n\n\n<p>Nation State Espionage<br>A third world country has solicited the services of several hackers to perform an attack on the U.S. treasury department. Which time of attack would this be classified as?<\/p>\n\n\n\n<p>Script Kiddie<br>I have very little IT experience but decide to use an advanced hacking tool to perform a denial-of-service attack on banks network. What type of attacker would I be considered?<\/p>\n\n\n\n<p>Insider Threat<br>A user is upset that he has just been fired and decides to perform a ping flood attack on the email server. What type of attacker would this user be considered?<\/p>\n\n\n\n<p>SQL Injection<br>Which attack allows an attacker to take control of a database by inserting special commands into input boxes instead of the intended data?<\/p>\n\n\n\n<p>Default Password<br>An administrator takes a new firewall out of the box and plugs it into the network without making any changes. What type of vulnerability did this create?<\/p>\n\n\n\n<p>ARP Poisoning<br>If an attacker was able to make changes to the computers cache of IP address to MAC address mapping, which type of attack has occured?<\/p>\n\n\n\n<p>Wiretapping<br>Which exploit includes using breaching the network cable and using a packet sniffer to listen and record the traffic on the network?<\/p>\n\n\n\n<p>A type of software that protects a computer from network attacks<br>Describe a personal firewall<\/p>\n\n\n\n<p>Symmetric encryption, the same key encrypts and decrypts data; asymmetric encryption, different keys encrypt and decrypt data<br>What are two types of encryptions?<\/p>\n\n\n\n<p>IDS can detect intrusions; IPS can stop malicious network attacks<br>What is the best choice that describes the difference between IDS and IPS?<\/p>\n\n\n\n<p>1) A limit is placed on the packets that can enter the network<br>2) Filters using layer 3 and 4 protocols<br>What is packet filtering? How does it work?<\/p>\n\n\n\n<p>What did you do?<br>What phrase represents Accounting the best?<\/p>\n\n\n\n<p>A stateful firewall that compares all inbound traffic to ensure there is an outbound request<br>A stateful firewalls uses Stateful Packet Inspection to protect the network. How does this type of firewall operate?<\/p>\n\n\n\n<p>Authentication, Authorization, and Accounting<br>What does AAA stand for?<\/p>\n\n\n\n<p>A server that authenticates and makes request on behalf of another system on the network<br>What is a proxy server?<\/p>\n\n\n\n<p>Social Engineering<br>If someone poses as the IT network admin, walks into a building and asks for the receptionist password to provide an update to their computer, what type of attack is this most likely to be?<\/p>\n\n\n\n<p>To prevent access, to create a fake access point of attack, and to gain intelligence to hack the WPA of the network<br>If a user can simply reconnect during a deauth attack. Why would a hacker use this attack?<\/p>\n\n\n\n<p>The Marine Corps uses serves in Azure to process images and keeps the processed images in a datacenter owned by DoD for use by other branches of military<br>What is the best scenario for a hybrid cloud solution?<\/p>\n\n\n\n<p>Deploy a VPN (virtual private network) and use a secure tunneling protocol<br>If you are using an unsecure network and need to login to data you would like to keep secure during transmission, what should you do?<\/p>\n\n\n\n<p>Encryption<br>For data that is at rest, what is the best method to protect the data?<\/p>\n\n\n\n<p>UDP<br>An admin wants to look for video\/audio in the network traffic logs. Which layer 4 protocol should the admin filter results by?<\/p>\n\n\n\n<p>Using two methods of authentication<br>MFA protects identities by<\/p>\n\n\n\n<p>1) WEP<br>2) WPA<br>3) WPA2<br>4) WPA3<br>Place the wireless encryptions in order from the weakest to the strongest<\/p>\n\n\n\n<p>Are you who you say you are?<br>What phrase represents Authentication best?<\/p>\n\n\n\n<p>What can you do based on who you are?<br>What phrase represents Authorization the best?<\/p>\n\n\n\n<p>Lock all doors to IT assets, remove default or out of the box passwords, remove all unnecessary logins, keep patches up to date, and audit access<br>How can a network admin harden hosts and network devices?<\/p>\n\n\n\n<p>Ad hoc and Infrastructure<br>What are the two wireless infrastructure modes?<\/p>\n\n\n\n<p>A datacenter owned by Hospital.com for Hospital.com employee apps and resources<br>What is the best example of private cloud?<\/p>\n\n\n\n<p>Application Firewall<br>A company needs to secure the network using a security system that can inspect the network traffic&#8217;s payload to prevent attacks. What type of firewall would you recommend?<\/p>\n\n\n\n<p>VLAN<br>The term for an ethernet switch is configured to separate traffic into multiple logical networks<\/p>\n\n\n\n<p>Eavesdrop on the traffic sent through the switch<br>ARP poisoning allows an attacker to<\/p>\n\n\n\n<p>False<br>Public cloud providers are not responsible for physical security of the server once a tenant has utilized it<\/p>\n\n\n\n<p>sources;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.wgu.edu\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.wgu.edu\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WGU C172 Objective Assessment Exam (Latest 2023\/ 2024 Update) Network and Security Foundations| Questions and Verified Answers| 100% Correct |Grade A WGU C172 Objective Assessment Exam(Latest 2023\/ 2024 Update) Network andSecurity Foundations| Questions and VerifiedAnswers| 100% Correct |Grade AQ: If someone poses as the IT network admin, walks into a building and asks for thereceptionist [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-130824","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/130824","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=130824"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/130824\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=130824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=130824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=130824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}