• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

Comprehensive Study guide for WGU D315 (Network and Security Foundations)

Latest WGU Jan 14, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

Comprehensive Study guide for WGU D315 (Network and Security Foundations) Leave the first rating Students also studied Terms in this set (139) Science Computer Science Save D315 - Things I Need to Study that w...43 terms The_Nice_Kween Preview Network+ N10-009 684 terms iOhaloPreview

D315 PA

189 terms Plaguedoctor2674 Preview C839v5 Teacher Sha Transport (Layer 4)What is the TCP/IP layer that includes the Transmission Control Protocol (TCP)?Application (Layer 7)Which layer of the TCP/IP model includes the Internet Message Access Protocol

(IMAP)?

Session (Layer 5)Which OSI model layer creates, maintains, and disconnects process communications over the network?Transport (Layer 4)Which OSI model layer is responsible for breaking data into packets?Application (Layer 7)Which layer of the OSI reference model includes all computer programs that interact with the network?Network (Layer 3)What is the OSI model layer that includes the IPX?Network (Layer 3)What is the layer of the OSI model that is responsible for logical addressing?Physical (Layer 1)What is the layer of the OSI model that translates binary computer language into the language of the transmission medium?Broadband RouterTypically refers to consumer-grade routers for internet access via broadband connections.Requires an internet connection.RouterAn IT manager is designing a new network and needs a device that connects multiple networks. Which device is needed?

ModemSends and receives data. Allows computers to transport digital info over analog lines, such as phone and cable.RouterPoint of connection between two or more networks, and forwards data packets between the networks. Connects networks on internet to networks at home.Provides ethernet port or wi-fi. Responsible for implementing Network Address Translation (NAT) HubConnects router to the network. Takes data packets from router and sends them to devices in the network. By connecting a USB hub to a PC, data packets can be transferred to multiple devices connected to your computer, but each device only looks at traffic destined for it and ignores the rest.RepeaterRepeaters take in the signal being sent, process it and then send out the signal stronger than before to the next waypoint SwitchConnect devices in a specific network and allow them to communicate within network. Like a hub but more complex, has capability to add security measures and function more intelligently, sending traffic directly from sender to receiver without other devices aware of communication. (Included in most internet routers) BridgeConnects two or more networks. Fast data transfer but lacks versatility. Not widely used today as routers and switches are favored.Different from a router because a router analyzes data packets to determine where to send, whereas a this forwards the data to next network without analysis.Edge RouterThis is at the end of the network backbone to connect to other core routers. It is meant to distribute packets to other networks than its own. (Layer 3 OSI) Core RouterInternal; does not distribute packets out of its network. (Layer 3 OSI) Subscriber Edge Routertele com networks to connect individual subscribers to the wider infrastructure.(Layer 3 OSI) Inter-provider Border Routertypically is ISP to ISP, really the core or the backbone of the Internet itself. (Layer

3 OSI)

Access Pointis used to interconnect wireless devices and provide a connection to the wired devices and provide a connection to the wire LAN.The data transfer speeds, for this, are dictated by the choice of wireless technology for the clients but this device will support Wireless-N (Layer 2 OSI) LANA network in a small office building connects all devices using wired connections with a star topology. Which type of network is described?PANAn executive uses Bluetooth to connect a laptop, a mobile phone, and a headset.Which type of network is described?MANA city uses fiber optic cable to connect smaller networks throughout the whole city. Which type of network is described?

Public (cloud)A company uses cloud service to manage its IT resources. The underlying hardware resources are shared by other companies as well. What is the cloud deployment model described in the scenario?Multi (cloud)A corporation uses both AWS and MS Azure in its architecture.Hybrid (cloud)This solution involves using a mix of on-premises data centers/private cloud and public cloud resources to achieve flexibility, scalability, and control.Private (cloud)The data and applications are hosted entirely on-site.Public (cloud)Provides cloud services to just about anyone Multi (cloud)An organization uses one cloud service provider for data management and another service provider for development platforms. What is the cloud deployment model described in the scenario?Type 1 HypervisorA company needs to maximize the number of virtual machines that can run on each host. Which hypervisor should be used?Type 2 HypervisorA developer has an existing computer with an operating system. The developer wants to use a hypervisor to have access to several virtual machines for a specific project. Which form of hypervisor fits the need described in the scenario?Type 2 HypervisorRuns on top of a host operating system, which introduces additional overhead and reduces the number of VMs that can efficiently run on the host. (e.g., VMware Workstation, Oracle VirtualBox) Type 1 HypervisorRuns directly on the hardware of the host machine, without needing an underlying operating system. Allows for greater efficiency, performance, and scalability, enabling the host to support more VMs.Data ModificationAn attacker gains unauthorized access to a computer and modifies browser security settings. What is the purpose of the attack?Data exportAn attacker uses a trojan horse to forward usernames and passwords to an anonymous email address. What is the purpose of the attack?Launch PointA compromised email server used to send phishing emails to other employees.Launch PointA device or server that has been breached and is under the control of the attacker. Can be within the target organization (internal or external).Used to distribute malware, conduct reconnaissance, or coordinate attacks on additional targets.Black hatA hacker purposefully breaks IT security to gain unauthorized access to systems and publish sensitive data. Which term describes the given hacker?White hatA hacker acts as an information system security professional who is hired to perform penetration testing. Which term describes the given hacker?

Brute force attackAn organization is the victim of an attack in which an attacker uses a software program to try all possible combinations of a password and user ID. What is the type of cyberattack described in this scenario?Credential stuffingA data breach exposed usernames and passwords to customer accounts of an online retailer. An attacker uses the exposed data to attempt to access accounts of another online retailer. Which malicious attack strategy is represented in the scenario?Dictionary attackAn attacker uses a list of commonly used access credentials to attempt to gain access to an online account. Which type of cyberattack is described?IP address spoofingAn organization is the victim of an attack in which an attacker tries to gain access to a system by disguising their computer as another computer. What is the type of cyberattack described in this scenario?Session hijackingAn organization is the victim of an attack in which an attacker uses a program to take control of a connection by pretending to be each end of the connection.What is the type of cyberattack described in this scenario?Man in the middle attackAn attacker intercepts messages between two parties before transferring them on to the correct destination. Which type of cyberattack is described?Social EngineeringAn attacker uses a false identification to gain physical access to IT infrastructure.Which malicious attack strategy is represented in the scenario?PhishingAn attacker sends emails claiming that an online account has been locked. The email provides a fake link with the goal of tricking the users into providing login credentials. Which type of cyberattack is described?PharmingAn organization is the victim of an attack in which an attacker uses a DNS poisoning strategy to direct users from a legitimate website to the attacker's website. What is the type of cyberattack described in this scenario?IntegrityA company is implementing network security components to ensure a higher level of data trustworthiness.ConfidentialityWhich CIA triad component is a driver for enabling data encryption?ConfidentialityWhich component of the IT security CIA triad is a driver for implementing audit and monitoring controls?IntegrityWhat is the component of the CIA triad for IT security that requires that IP packets be retransmitted if the receiving host has an invalid checksum value?Violation of ConfidentialityA company stores sensitive customer data without access controls.Violation of AvailabilityA new employee has not been issued access credentials to the company's network for needed information.

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

This document featured step-by-step guides that was a perfect resource for my project. Such an impressive resource!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 14, 2026
Description:

Comprehensive Study guide for WGU D315 (Network and Security Foundations) Leave the first rating Students also studied Terms in this set Science Computer Science Save D315 - Things I Need to Study ...

Unlock Now
$ 11.00