WGU Network and Security - Foundations - D315 - PA & Questions Leave the first rating Students also studied Terms in this set (228) Science Computer Science Save
WGU D315 - PRE-ASSESSMENT: NET...
205 terms Mira_PakPreview
D315 PA
189 terms Plaguedoctor2674 Preview WGU C851 (Linux Foundations) 81 terms aurielcofieldPreview WGU D 179 term bas P TracerouteUsed to determine the number of hops required for a packet to reach its destination NslookupUsed to determine IP address of a domain name.PingUsed to determine the IP address and latency in networks.Netstat -aUsed to display IP ports currently open on the Windows OS.WhoisInformation about a webserver including contact information.ARPThis command displays the IP to physical (MAC) address mappings for hosts that have been discovered in the ______ cache. ______ can be used to add, remove, or modify entries in the ______ cache. The hosts need to be on the local network, as these addresses are discovered by broadcasting to everyone on the network and noting the reply from the owner; broadcast traffic is not allowed through a router so that the system will maintain the MAC address of the router.NmapThis command scans networks to see what it can find in terms of hosts and open ports (including well- known ones for many applications). It is commonly used to determine what is deployed on a network for vulnerability analysis, security scans, and related activities.
ipconfigProvides the user with the IP, subnet mask, and default gateway for each network adapter by default with the /all option information, such as MAC address, DHCP status, and lease information. The command with the /release option can be used to release all connections and renew all adapters. It is primarily used in Windows.ifconfigSimilar to ipconfig, this command is used to configure the kernel network interfaces. It is implemented at the time of booting to configure the necessary interfaces. Once the interfaces are configured, it is used for debugging or tuning the system. It is primarily used in Linux.digA command used to query the DNS name servers. It is helpful in troubleshooting DNS problems. It is also used for lookups and will display answers from the query.It is a replacement for nslookup.routeThis command can be used to display the current route tables on a host. It can also be used to add or remove routes. This is used by the local host to determine where to send traffic (0.0.0.0 means the default gateway, where the router sends things if it is not otherwise defined in the routing table).scpThis command is used to securely copy files between servers, leveraging SSH (secure shell) for authentication and encryption.ftpThis command copies the file from one host to another host. The data is unencrypted. If encryption is needed, the encrypted version uses SSL/TLS (Secure Sockets Layer, replaced by Transport Layer Security; the same encryption used in https). Transfer uses TCP (transmission control protocol) for reliability and is often used on the internet and other wide-area networks, where errors may be more common.tftpThis command transfers a file from either a client to a server or from a server to a client using UDP (user datagram protocol) instead of TCP, and so it is usually used on reliable (local) networks.fingerFinger displays information about a user or users on a remote system, including things such as last log-in time and username. It is primarily used in Linux.tcpdump· Displays all TCP IP packets that are passing through your network connection in real time (Linux) telnet/sshThese commands allow a user to manage accounts and devices remotely. The main difference between the two is that SSH is encrypted, and thus all data is secure from eavesdropping, while telnet is unencrypted.tracepathThis command is similar to traceroute or tracert in that it displays the path taken by a packet from its source to its destination. This command is useful because it can be used by any user instead of needing superuser privileges. It is primarily used in Linux.Which network command displays the IP Address to MAC Address mapping on a Windows computer?ARP - Address Resolution Protocol
NmapScans networks to see what it can find in terms of hosts and open ports. Used to determine what is deployed on a network for vulnerability analysis, security scans, and related activities Which type of wireless security protocol is the most secure?WPA2 and AES Public KeyAsymmetry. Used for encryption and labeled name of person who is decrypting.Private KeyAsymmetry. Used for decryption and will be the name of the person holding private key.Dave is sending a Message to Joanna using asymmetric cryptography algorithm What key should she use to ENCRYPT the message?Joanna's public key A user notices that data seems to be missing or altered and computer settings are sometimes changed randomly.The user knows that no one else has physical access to the computer, and antivirus software scans do not detect any culprits. Which action should be taken to identify the problem?Install software to look for and remove rootkits A university campus has multiple buildings connected by underground fiber-optic cables.Which network component manages the flow of data between these buildings?Router In a network where all computers communicate through a central server, which type of network architecture is being used?Client/Server In a network where there is a mainframe computer serving terminals across the organization, which type of network architecture is being used?Hierarchical Which command can they use to display the IP configuration of their computer?Ipconfig-Ipconfig is used to display the IP configuration, including IP address, subnet mask, and default gateway.A user suspects that their Windows computer is infected with malware causing network issues. Which command can they use to display active network connections and processes?Netstat A user is experiencing slow internet speeds and suspects network congestion. Which command can they use to test the latency and response time to a specific destination?Ping
A Linux user wants to view the routing table on their system to troubleshoot routing issues. Which command should they use?Route-The route command is used to display and manipulate the IP routing table on a Linux system A Linux user wants to view detailed information about their network interfaces, including IP addresses, netmasks, and interface status. Which command should they use?Ifconfig A Linux user is experiencing slow internet speeds and suspects network congestion. Which command can they use to test network connectivity and measure the round- trip time to a specific destination?Traceroute Which layer of the OSI model is primarily responsible for translating network addresses into their physical counterparts and deciding how to route data from the sender to the receiver?The Network Layer Which OSI layer is responsible for establishing, maintaining, and terminating connections between applications?The Session Layer At which OSI layer does Transmission Control Protocol (TCP) operate?The transport layer Which TCP/IP layer is responsible for logical addressing and routing?The Internet Layer Where does Hypertext Transfer Protocol (HTTP) operate in the OSI model?The Application Layer Which layer of the OSI model is responsible for providing error-free data transmission over a network, handling error detection, and error correction?Transport Layer In the TCP/IP model, which layer corresponds to both the session, presentation, and application layers of the OSI model?The Application Layer When virtualization software is installed directly on the physical hardware of a server, which type of hypervisor is being used?Type 1 If a user installs virtualization software on their existing operating system, which type of hypervisor are they using?Type 2