• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

Network and Security - Foundations - D315 WGU

Latest WGU Jan 14, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

Network and Security - Foundations - D315 WGU 5.0 (3 reviews) Students also studied Terms in this set (70) Western Governors UniversityD 315 Save

WGU D315 - PRE-ASSESSMENT: NET...

205 terms Mira_PakPreview WGU D315 Network and Security Fo...70 terms drbeesaPreview D315 pre assessment 60 terms escamilla9118 Preview WGU C 233 term kam Which OSI layer is related to the function of the IP protocol suite?Network

  • multiple choice options
  • Which OSI layer is responsible for organizing how bits are passed over the physical layer between devices within the same collision domain?Data link

  • multiple choice options
  • Which OSI layer would define the scope of a protocol that makes sure packets of data are received correctly and resends them if they are not?Transport

  • multiple choice options
  • Which protocol suite performs functions of OSI layer 4? TCP

  • multiple choice options
  • Which type of Ethernet cable can maintain 10Gbps transmission speeds through the course of its maximum 100-meter length?CAT 6a

  • multiple choice options
  • Which Internet access technology uses ordinary telephone wires for data transmission?

    DSL

  • multiple choice options
  • Which device is used to organize network cables as they run between switches and other network devices?Patch panel

  • multiple choice options
  • Which network device is used to connect two or more network segments by performing OSI layer 3 functions like packet-forwarding?Router

  • multiple choice options

Which network device is used to convert between digital information from a LAN and analog signals for transmission over a standard telephone wire?Modem

  • multiple choice options
  • Which device could be used to send commands to the mainframe for remote execution in early mainframe installations?Dumb terminals

  • multiple choice options
  • Which device is responsible for implementing network address translation (NAT)?Router

  • multiple choice options
  • Which command produces the following output?Non-authoritative answer:Name:

www.google.comAddress: 172.217.11.132

nslookup

  • multiple choice options
  • Which command should be used to manually enter the default gateway for a computer?route

  • multiple choice options
  • Which network diagnostic tool displays the path packets take between two endpoints?traceroute

  • multiple choice options
  • Which network type is used to wire multiple PCs to a home router?

    LAN

  • multiple choice options
  • An office's infrastructure connects network devices and printers through a central access point without the use of cabling.Which network type does this office use?

    WLAN

  • multiple choice options
  • What type of medium is commonly used within a 1000 Mbps Ethernet network?CAT5e

  • multiple choice options
  • Which network topology is shown in the following diagram?Full mesh

  • multiple choice options
  • Which network topology is being implemented when each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node?Ring

  • multiple choice options
  • In which physical LAN topology are nodes connected to each other with a backbone cable that loops around and ends at the same point it started?Ring

  • multiple choice options

Which OSI layer ensures error-free packets?Transport

  • multiple choice options
  • Which topology uses a switch or hub to connect to all devices in the same network?Star

  • multiple choice options
  • Which cloud service provides hardware, operating systems, and web servers but not end-user applications?PaaS

  • multiple choice options
  • Which cloud model provides an exclusive cloud computing service environment that is shared between two or more organizations?Community

  • multiple choice options
  • Which type of software is used to provide virtualization? Hypervisor

  • multiple choice options
  • A user that does not want to be identified while communicating on a network uses an application to alter the computer's identity.Which type of exploit is being perpetrated?Spoofing

  • multiple choice options
  • An attacker attempts to misdirect traffic on a network back to the attacker by corrupting the network computer's cache of IP address to MAC address mappings that are cached.Which exploit is the attacker perpetrating?ARP poisoning

  • multiple choice options
  • Which exploit actually breaches the physical medium or uses devices to monitor signals from outside the physical medium itself?Wiretapping

  • multiple choice options
  • Which type of attack can overwhelm a web server by inserting more data into a web form than the system was configured to hold?Buffer overflow

  • multiple choice options
  • Which type of attack sends an email claiming to be from a reputable business in order to entice the recipient to provide sensitive information?Phishing

  • multiple choice options
  • A user on a network is planning to launch an exploit against a coworker in a neighboring department. The user needs to identify the IP address of a coworker in the desired department.Which tool or utility will allow the user to watch network traffic in real time to identify a target?Sniffer

  • multiple choice options

Which group of attackers is typically used for penetration testing?Red team

  • multiple choice options
  • Which type of attack exploits an unpatched software vulnerability?Zero-day

  • multiple choice options
  • A company has the policy that all new user passwords are P@ssw0rd but does not require new users to change their password. An employee randomly tries a coworker's account with the new user password to see if they can log in as the coworker.Which type of vulnerability does this create?Default password

  • multiple choice options
  • An employee that does not want to miss emails from important clients sets up her cellular smartphone to allow her to check email. Unfortunately, she does not install antivirus software on the cellular phone.What type of vulnerability is represented?BYOD/Mobile

  • multiple choice options
  • What is the definition of vulnerability, in computer security?It is a weakness which can be exploited by a threat, such as an attacker, to perform unauthorized actions within a computer system.

  • multiple choice options
  • What is required to establish a secure connection to a remote network over an insecure link?Virtual Private Network (VPN) service

  • multiple choice options
  • An organization is concerned about brute force attacks.How should the organization counter this risk?Institute a log-in policy that locks users out of an account after three failed password attempts.

  • multiple choice options
  • An organization suffers a social engineering attack that results in a cybercriminal gaining access to its networks and to its customers' private information.How can the organization mitigate this risk in the future?Provide regular cybersecurity training for employees

  • multiple choice options
  • An attacker plans to exploit flaws in an operating system to gain access to a user's computer system.What is a prevention mechanism for this type of attack?Patching

  • multiple choice options
  • An unauthorized third-party has gained access to a company network.How can they be prevented from deleting data?Access controls

  • multiple choice options

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

With its detailed explanations, this document was a perfect resource for my project. Definitely a excellent choice!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 14, 2026
Description:

Network and Security - Foundations - D315 WGU 5.0 (3 reviews) Students also studied Terms in this set Western Governors UniversityD 315 Save WGU D315 - PRE-ASSESSMENT: NET... 205 terms Mira_Pak Pre...

Unlock Now
$ 11.00