• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

D315 WGU

Latest WGU Jan 14, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

D315 WGU

Leave the first rating Students also studied Terms in this set (173) Science Computer Science Computer Security and Reliability Save The CIA Triad Scenarios 10 terms Dennism0Preview WGU C851 Linux Foundations Teacher 175 terms MDW2100Preview WGU D333 Ethics in Technology - W...332 terms DrkintrudrPreview

D315 PA

189 term Pla Practice questions for this set Learn1 / 7Study using Learn Accounts not used by the network administrator Network devicesSwitches, routers, and firewalls with access to data Compromised deviceDevice accessed by a malicious user or attacker Wireless networksNetworks vulnerable to attackers in close proximity HardeningProcess of securing and testing network devices Choose an answer 1Network devices2Backup 3Default passwords4Unnecessary logins Don't know?

Default passwordsFactory-set passwords that should be changed Unnecessary loginsAccounts not used by the network administrator Strong password policyRequiring complex passwords and regular changes Unnecessary servicesOptional features that increase the risk of attack PatchingInstalling security updates to fix vulnerabilities Physical accessAbility to physically interact with a device Trusted networkNetwork authorized to make changes to a device Wireless network encryptionConfiguring WPA2 or WPA3 for secure traffic Audit logsRecords of device activity for analysis and detection BackupCreating copies of device configurations for restoration AuthenticationProcess of confirming a person's identity Microsoft Active DirectoryAuthentication system that confirms user identity via passwords Public Key Infrastructure (PKI)Authentication system that uses certificates to validate website identity AuthorizationDetermines what a user may access after authentication Restrictive PermissionsApplying limited access to data and securing servers and network devices Data LeaksRisk of unauthorized access to confidential data Malware InfectionAccidental infection of network data files by a user's infected computer AAA InteractionClient communication with a radius server via the cloud AccountingProcess of verifying access control settings and providing a forensic trail Immutable LogsAudit logs stored in an unchangeable form to prevent tampering MFAMulti-factor authentication, an optional add-on to the authentication process 2FAAnother term for multi-factor authentication PINPersonal Identification Number used as part of multi-factor authentication Biometric ScanFacial, retinal, or fingerprint scan used for multi-factor authentication

Touch IDFingerprint scan used for authentication on Apple devices Face IDFacial recognition scan used for authentication on Apple devices Proximity-based SecurityAutomatic unlocking of devices when in close range Windows HelloMechanism on Microsoft Windows computers using fingerprint or facial recognition Wireless network attacksAttacks on wireless networks that can be done remotely Denial of Service (DoS) attackAn attack that enables unauthorized access and traffic monitoring of a wireless network Deauth attackA denial-of-service (DoS) attack where the attacker can force clients off a network WPA3 securityA security protocol that encrypts management packets in a wireless network WPA2 securityA security protocol that encrypts data traffic in a wireless network Fake Access attackAn attack where an attacker sets up an illegitimate wireless network to intercept data VPN tunnelA secure connection that encrypts all traffic sent and received over a wireless network 802.1xNetwork access control protocol for trusted network access WAPWireless Access Point used for network access RADIUSRemote Authentication Dial-In User Service for validating credentials EAPExtensible Authentication Protocol used for validating credentials Authorization PoliciesPolicies defined by a network administrator for determining user's access rights Antivirus or Malware ScannersSoftware used to check for viruses or malware on a computer Corporate StandardSet of requirements or guidelines for devices used in a corporate network Limited Network AccessRestricted access to certain network resources Network Access RequestRequest made by a client to connect to a network Network Access GrantPermission given by the WAP or switch to allow network access Ad-hoc modeWireless communication in a peer-to-peer fashion without a WAP

Ad-hoc networksUsed for setting up new devices or transferring files between devices Infrastructure modeWireless devices connected to the network via wireless routers or access points Wireless routerCombination of a WAP and a router, used to connect to the internet and provide wireless connectivity Triple DESSymmetric encryption algorithm using DES three times in a row AESAdvanced Encryption Standard with key lengths of 128-bit, 192-bit, or 256-bit WEPWired Equivalent Privacy, an outdated wireless security standard WPAWi-Fi Protected Access, a wireless security standard to overcome WEP weaknesses WPA2Wi-Fi Protected Access 2, the standard for wireless security for 15 years WPA3Wi-Fi Protected Access 3, released in 2018 to address WPA2 weaknesses DESData Encryption Standard, an antiquated encryption algorithm NISTNational Institute of Standards and Technology, a US government agency MicrosoftA multinational technology company Wi-FiWireless networking technology Brute forceMethod of trying all possible combinations to crack encryption EncryptionProcess of converting data into a secure form Symmetric key algorithmEncryption algorithm that uses the same key for both encryption and decryption Key lengthNumber of bits in an encryption key Quantum computingComputing using quantum bits (qubits) instead of classical bits Hardware accelerationUsing specialized hardware to speed up a specific task CPU instruction setSet of commands that a CPU can understand and execute AES-NIAES New Instructions, CPU instructions for AES encryption WEP keyEncryption key used in Wired Equivalent Privacy HexadecimalNumber system with base 16, using digits 0-9 and letters A-F

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

I was amazed by the step-by-step guides in this document. It made learning easy. Truly outstanding!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 14, 2026
Description:

D315 WGU Leave the first rating Students also studied Terms in this set Science Computer Science Computer Security and Reliability Save The CIA Triad Scenarios 10 terms Dennism0 Preview WGU C851 Li...

Unlock Now
$ 11.00