WGU - C700 – Pre-Assessment 2023
latest complete solution
An organization that uses a client-server model permits remote user machines to
access its network and distributed resources. With this setup, the organization
recognizes that remotely used client machines can become threats.
Which requirement should this company subject its remote clients to in order to secure
data and communications in the system?
Create a fortress mentality for secure data communications
Run processes in user and supervisory modes at the same time
Allow users only minimal but not necessary access to sensitive resources
Install restricted user-interface mechanisms and database management systems -
Install restricted user-interface mechanisms and database management systems
A technology-based firm wants to implement secure data communication between
secure desktops to a remote server while keeping reliability as the most important
requirement in its scope.
Which kind of secure data communication should be used within a WAN environment?
Transmission control protocol (TCP)
User datagram protocol (UDP)
Point-to-point protocol (PPP)
Hypertext transfer protocol (HTTP) - Transmission control protocol (TCP)
A systems developer needs to reduce or eliminate the vulnerability of impersonation.
Which security solution should this system developer adopt?
Restrict access
Digital signatures
Blacklist services
Blocking attachments - Digital signatures
A systems developer needs to create a subscription system for a list of known email
abuse sources.
Which solution should be used to create this item?
Blacklist services
Whitelist services
Subscription services
Domain name services - Blacklist services
A software developer needs to secure emails for a bank using a public-private key
system. The system should include a variety of algorithms that encrypt files and email
messages.
Which email security solution should this developer use?
Pretty good privacy
DomainKeys identified mail
Post office protocol 3 (POP3)
Simple mail transfer protocol (SMTP) - Pretty good privacy
Which service manages the monitoring of devices within the application layer?
File transfer protocol (FTP)
Point-to-point protocol (PPP)
Hypertext transfer protocol secure (HTTPS)
Simple network management protocol (SNMP) - Simple network management protocol
(SNMP)
Which service is managed at the transport layer of the TCP/IP stack?
Network file services (NFS)
User datagram protocol (UDP)
Hypertext transfer protocol (HTTP)
Simple mail transfer protocol (SMTP) - User datagram protocol (UDP)
Which layer of TCP/IP composes the simplex connectionless protocol user datagram
protocol (UDP)?
Network
Transport
Application
Presentation - Transport
Which layer of the OSI model is affected if a data center experienced a power outage
with no backup power supply?
Session
Network
Physical
Transport - Physical
Which layer is affected if an organization has weak authentication communication
protocols?
Session
Transport
Application
Presentation - Session
A consultant explains that there is no mechanism within internet control message
protocol (ICMP) for the retransmission of lost or damaged packets.
Why are ICMP error messages sent to the host?
Transmission control protocol (TCP) connection-related protocols can detect errors.
They help the sending process or its human user to diagnose problems.
Connection- or session-related protocols detect errors in the local area network (LAN).
ICMP automatically retransmits every other packet to support WAN connectivity. - They
help the sending process or its human user to diagnose problems.
According to error logs associated with the local area network (LAN), one of the layers
of the OSI model needs to be used to provide error correction.
Which layer should be used?
Session
Data link
Transport
Application - Transport
A software developer needs to disconnect a transmission control protocol (TCP)
session when a communication session is complete.
What is the first packet that ensures this process?
FIN flagged packet
SYN flagged packet
ACK flagged packet
RST flagged packet - FIN flagged packet
A software developer establishes a communication between a web server and a web
browser over a network connection.
Which protocol is encapsulated in the transmission control protocol (TCP) to ensure this
action?
User datagram protocol (UDP)
File transfer protocol (FTP)
Simple mail transfer protocol (SMTP)
Hypertext transfer protocol (HTTP) - Hypertext transfer protocol (HTTP)
How would hackers sniff network traffic during an address resolution protocol (ARP)
poisoning attack?
By locating corresponding media access control (MAC) addresses using reverse ARP
By changing the target computer's ARP cache with a forged ARP request
By using several malware programs to flood the ARP network with erroneous replies
By concealing the sender's identity by impersonating another ARP computing system -
By changing the target computer's ARP cache with a forged ARP request
Which attack allows an attacker on the same subnet as its victims to eavesdrop on all
network traffic between the victims?
Man-in-the-middle (MITM) attack
Secure sockets layer (SSL) strip
Address resolution protocol (ARP) spoof
Address resolution protocol (ARP) poison routing - Man-in-the-middle (MITM) attack
Which protocol is used to transmit web page elements from a web server to web
browsers?
User datagram protocol (UDP)
Hypertext transfer protocol (HTTP)
Transmission control protocol (TCP)
Internet control message protocol (ICMP) - Hypertext transfer protocol (HTTP)
Which protocol provides background security support services for IPSec by negotiating,
establishing, modifying, and deleting security associations?
Secure sockets layer (SSL)
Transport layer security (TLS)
Internet small computer system interface (iSCSI)
Internet security association and key management protocol (ISAKMP) - Internet security
association and key management protocol (ISAKMP)
A company needs to securely connect a client with the company's server. The security
is handled by the two hosts and the traffic carried belongs only to the two hosts.
Which interconnection provision should be used between this server and this client?
Site-to-site virtual private network (VPN)
Host-to-site virtual private network (VPN)
Host-to-host virtual private network (VPN)
Remote access virtual private network (VPN) - Host-to-host virtual private network
(VPN)
Two partnering companies are interested in connecting their respective IPSec gateways
through a secure connection.
Which interconnection is needed to meet this goal?
Site-to-site virtual private network (VPN)
Site-to-host virtual private network (VPN)
Host-to-site virtual private network (VPN)
Host-to-host virtual private network (VPN) - Site-to-site virtual private network (VPN)
An organization is interested in implementing a virtual private network (VPN) that will
extend the company's network to all the branches.
What is the appropriate VPN technology to deploy?
VPN router
VPN gateway
Site-to-site VPN
Host-to-site VPN - Site-to-site VPN
A network administrator needs to maintain a list of destination networks along with
metrics of direction using a protocol service that operates at the network layer.
Which protocol should be used?
Secure sockets layer (SSL)
Point-to-point protocol (PPP)
Remote procedure call (RPC)
Routing information protocol (RIP) - Routing information protocol (RIP)
A network administrator is implementing a new virtual private network (VPN) for an
organization. The administrator needs to use a tunneling protocol that protects
transmitted traffic and supports the transmission of multiple protocols at the data link
layer in the OSI model.
Which protocol should be used?
Layer 2 forwarding (L2F)
Layer 2 tunneling protocol (L2TP)
Internet protocol security (IPSec)
Point-to-point tunneling protocol (PPTP) - Layer 2 tunneling protocol (L2TP)
An institution is using a network application that supports an exchange of files.
Which application layer protocol should be used?
File transfer protocol (FTP)
Remote procedure call (RPC)
Border gateway protocol (BGP)
Structured query language (SQL) - File transfer protocol (FTP)
A school uses a link state routing protocol at the network layer to maintain a topography
map of all connected networks.
Which protocol should be used?
Open shortest path first (OSPF)
Routing information protocol (RIP)
Interior gateway routing protocol (IGRP)
Enhanced interior gateway routing protocol (EIGRP) - Open shortest path first (OSPF)
Which approach will detect the presence of rogue wireless access points?
Changing the service set identifier (SSID)
Operating a wireless intrusion detection system (IDS)
Turning on Wi-Fi protected access 2 (WPA2) encryption
Deleting old wireless profiles - Operating a wireless intrusion detection system (IDS)
An attacker used a packet sniffer to discover the secure service set identifier (SSID) of a
wireless network.
Which approach should be used to secure this network?
Wired equivalent privacy (WEP)
Wi-Fi protected access 2 (WPA2)
Wireless application protocol (WAP)
Media access control (MAC) filtering - Wi-Fi protected access 2 (WPA2)
Which hardening feature should be used to isolate static environments to prevent
changes or exploits from reaching them?
Network firewall segmentation
Automatic and security updates
Encryption and integrity checks
Virtual local area network segmentation - Virtual local area network segmentation
Which hardening feature should be applied to improve security of a wireless network if
the pool of wireless clients is relatively small and static?
Enable media access control (MAC) filtering
Disable media access control (MAC) filtering
Enable the service set identifier (SSID) broadcast
Disable the service set identifier (SSID) broadcast - Enable media access control (MAC)
filtering
What should a network administrator do to ensure that the server operating system is
up to date?
Install patches
Update default settings
Implement physical security
Limit the use of the root account - Install patches
Which form of firewall control is implemented at the Layer 3 level of the OSI model?
Next-generation firewall
Circuit-level gateway firewall
Static packet-filtering firewall
Application-level gateway firewall - Static packet-filtering firewall
Which Layer 2 control protocol is implemented to resolve internet protocol (IP)
addresses into media access control (MAC) addresses?
Address resolution protocol (ARP)
Hypertext transfer protocol (HTTP)
Internet message access protocol (IMAP)
Simple network management protocol (SNMP) - Address resolution protocol (ARP)
Which Layer 3 firewall can recognize malware applications?
Proxy
Circuit-level
Next-generation
Stateful packet inspection - Next-generation
Which access point hardening technology must be used in conjunction with the 802.11i
standard for wireless transmission between the access point and the wireless client
host?
Layer 2 switch
Layer 3 switch
Wireless access point
Protected access point - Protected access point
Which hardening technique satisfies a policy that requires complete integrity from the
download source for all files downloaded by employees to the organization's
workstations?
Source-based firewall for packet inspection downloads
State-based firewall for packet inspection downloads
Intrusion prevention system (IPS) to quarantine downloaded files until they are
approved by an administrator
Intrusion detection system (IDS) that requires the message-digest algorithm 5 (MD5) or
the secure hash algorithm (SHA) totals from the source - Intrusion detection system
(IDS) that requires the message-digest algorithm 5 (MD5) or the secure hash algorithm
(SHA) totals from the source
Which hardening technique satisfies a policy that requires complete confidentiality for
data transmission of customer financial data during a web-based purchase transaction
that is sent to a corporate web server from a customer web browser?
Implementing a Kerberos authentication process that is required for customers prior to
sending data
Implementing secure sockets layer (SSL) on the web server that is required for
customers prior to sending data
Requiring customers to use the secure real-time transport protocol to establish a
connection with the web server prior to sending data
Requiring customers to use the challenge handshake authentication protocol to
establish a connection to the web server prior to sending data - Implementing secure
sockets layer (SSL) on the web server that is required for customers prior to sending
data
Which hardening technique satisfies a policy that requires complete confidentiality for
VoIP communications?
Pretty good privacy (PGP)
Secure sockets layer (SSL)
MIME object security services (MOSS)
Secure real-time transport protocol (SRTP) - Secure real-time transport protocol (SRTP)
Which type of hardening standard is demonstrated when a company prevents nefarious
people from controlling the network?
Access control
Policy-based control
Authorization control
Implementation-based control - Access control
A wireless site survey reveals an access point initiating a simple network management
protocol (SNMP) trap command.
Which problem is occurring?
Signal deficiencies
Abnormal error rate
Channel interference
Building construction deficiency - Abnormal error rate
The appropriate radius for each access point in a multistory building is determined to be
15 ft. Each access point is placed 30 ft apart. A wireless site survey of this building
shows several dead spots.
What is causing this problem?
Overloaded access points
Underloaded access points
Improper three-dimensional planning
Presence of signal obstructions - Presence of signal obstructions
A consultant, who conducted a wireless site survey, recommends using shorter
propagation distances and not placing access points precisely in the middle of the
circle.
What was overlooked during the design/deployment phase that led to this conclusion?
The large radius of service around the access point
The presence of obstructions on the signal path
Channel interference due to a lower number of hosts
Signal deficiencies due to interference from other access points - The presence of
obstructions on the signal path
A wireless site survey reveals that hosts are dropping down to lower transmission
speeds, so frames are taking longer to send and receive.
Which action addresses this problem?
Running signal analysis software
Moving the access points farther apart
Running virtual private network (VPN) software
Moving the access points closer together - Moving the access points closer together
A company has recently relocated a group of employees. The previous wireless site
survey indicated a sufficient signal, but complaints have been received at the service
desk about the wireless coverage.
How should the organization address this category of problems?
Conduct ongoing site surveys
Remove walls that may cause obstructions
Restrict wireless access to specific times of day
Place access points on reflective surfaces - Conduct ongoing site surveys
An organization's demilitarized zone (DMZ) is compromised by an intrusion. The
attacker is able to send spoofed SYN packets to the victim, using the victim's IP
address, which froze, crashed, or rebooted the systems.
Which countermeasure should be applied to avoid this threat in the future?
Auditing
Honeypots
Padded cells
Filtering traffic - Filtering traffic
A network administrator suspects the demilitarized zone (DMZ) is compromised by an
attack without a signature. As a countermeasure, the administrator needs to implement
a tool that detects abnormal activity using anomaly and heuristics-based detection.
Which type of detection tool should the administrator use for this task?
Host-based
Network-based
Behavior-based
Knowledge-based - Behavior-based
An organization's demilitarized zone (DMZ) is compromised by an attack that exploits a
known flaw. As a countermeasure against attacks of this type, the network administrator
wants to implement false vulnerabilities that alert administrators to the attack.
Which type of countermeasure should be implemented?
Padded cells
Pseudo flaws
Warning banners
Sandboxing applications - Pseudo flaws
Which term indicates the points where electronic communications interface with
services for which the organization is legally responsible?
Dead zones
Control zones
Logical security boundaries
Network segment boundaries - Logical security boundaries
What is the security access control part of the trusted computing base (TCB) that
validates access to every resource prior to granting access requests?
Security kernel
Reference monitor
Security perimeter
Information monitor - Reference monitor
Which Layer 3 device can be deployed to control traffic between a private network and
the link to the internet?
Hub
Bridge
Switch
Firewall - Firewall
Which invisible element differentiates the trusted computing base (TCB) from the
remainder of the system so unsecure communications between the TCB and the rest of
the system are avoided?
Reference monitor
Security perimeter
Mandatory access control
Discretionary access control - Security perimeter
A network administration of an organization has created air gaps between networks of
different security levels.
Why does this protect sensitive assets?
Gaps provide application-specific, server-side logical firewalls.
Gaps provide application-specific, server-side physical firewalls.
Transactions will only occur between devices logically on the network.
Transactions will only occur between devices physically on the network. - Transactions
will only occur between devices physically on the network.
A network administrator for a hospital is required by legal regulations to enforce
confidentiality for the sensitive data trafficking the wireless segment of the hospital
network.
Which method is most appropriate to achieve this requirement?
Wi-Fi protected access (WPA)
Wired equivalent privacy (WEP)
Wi-Fi protected access 2 (WPA2)
Extensible authentication protocol (EAP) - Wi-Fi protected access 2 (WPA2)
A network administrator for an e-retail business is designing a segmented network to
support business operations. The network will consist of a connection to the internet, a
router, a public-facing web server, a database server hosting sensitive customer data,
and firewalls.
Which secure segmentation architecture should the network administrator implement?
Three-tier
Back propagation
Third-party cloud
Feed-forward redundant - Three-tier
A company wants to keep all its host machines hardwired to the same switch and on the
same local area network (LAN).
Which segmented model should the company implement?
Logical
Physical
Air gapped
Virtualization - Physical
A company wants to create a network subnet for public-facing servers that must be
accessible to the outside world. The requirement is that access from the internet must
be very permissive, but communication from the perimeter network to the internal
corporate network should be minimized and rigidly controlled.
Which segmented model should the company implement?
Least permissions
Demilitarized zone
Logical segmentation
Role-based access control - Demilitarized zone
A network consultant explains to a new client that networks are usually segmented into
smaller organizational units that help boost performance, reduce communication
problems, and improve security.
Which network components provide these benefits?
Switch-based virtual local area networks (VLANs), routers, or firewalls
Web-services with network-based access control
Distributed servers that communicate with one subnet
Distributed servers that communicate with several subnets - Switch-based virtual local
area networks (VLANs), routers, or firewalls
A federal agency has several divisions located on different floors in a building. The
agency wants to use wireless networking within a few rooms of one division but not
allow it anywhere else.
Which segmented model should the company use?
Air gap
Logical
Virtualization
Faraday cage - Faraday cage
A hotel network administrator needs to build a network so the connections in the same
unit can communicate, but the connections between units should not be able to
communicate.
Which characteristic of a virtual local area network (VLAN) can be implemented?
Firewall
Hindrance
Port isolation
Routing function - Port isolation
A company uses firewalls to create a demilitarized zone (DMZ). They have a web server
that needs to be accessible to internet users. The web server must also be able to
communicate with a database server for retrieving product, customer, and order
information.
How should devices be placed on the network to best protect the servers?
Both the database and the web servers should be placed on the DMZ.
Both the database and the web servers should be placed on the private server.
The database server should be placed inside the DMZ, but the web server should be
placed on the DMZ.
The web server should be placed inside the DMZ, but the database server should be
placed on the private network. - The web server should be placed inside the DMZ, but
the database server should be placed on the private network.
A company needs to install a tool to monitor the network and raise an alert when a
sniffer is detected.
Which tool should be used?
Firewall traffic filter
Switched port analyzer
Network discovery scanner
Intrusion detection system (IDS) - Intrusion detection system (IDS)
A network administrator proposes that an organization utilize masks to solve a network
problem.
Which problem will be solved?
Frames can only be sent out one port; each Ethernet address only appears in one row.
A representation of a range of internet protocol (IP) addresses going to the same subnet
allowing the packet to be sent back out.
There is no way to tell by looking at an internet protocol (IP) address what size the
network, subnet, and host parts are; only that their total is 32 bits.
The mesh topology provides for many alternative routes so a router cannot stop the first
time it finds a row match for each arriving packet. - There is no way to tell by looking at
an internet protocol (IP) address what size the network, subnet, and host parts are; only
that their total is 32 bits.
A company experienced a denial-of-service (DoS) attack.
Which tool will help determine the cause?
IPSec tunnel
Frame relay technology
Intrusion detection system (IDS)
Serial line internet protocol - Intrusion detection system (IDS)
A network administrator is having problems with the network and suspects a router or
host has crashed. The administrator needs to perform a root cause analysis to
determine if a device failed.
What is a step in this root cause analysis?
Installing a firewall
Using the ping command
Updating system firmware
Implementing a keystroke logger - Using the ping command
A database administrator notices that attackers have successfully accessed the
company's database through its website.
What should be done to identify the root cause of this problem?
Implement a patch management program
Move the database to a server behind an additional firewall
Open a trouble ticket and immediately document the incident
Examine system elements to determine what allowed the attackers to succeed -
Examine system elements to determine what allowed the attackers to succeed
A web application at an outpatient hospital needs access to the hospital's database. The
firewall administrator created a rule allowing access from the web server to the
database server. A few days later, the IT professional at the hospital noticed SQL
injection attacks on the database.
What is the root cause of this attack?
Some hospital computers were infected by a virus.
An updated hospital policy affected internet access.
A wired equivalent privacy (WEP) wireless security system was used at the hospital.
The web application allowed unauthorized requests to the database. - The web
application allowed unauthorized requests to the database.
A database server connected to a local area network (LAN) owned by a retail business
was breached by an attacker via the internet who executed a SQL injection.
Which condition is the root cause of the breach?
Port 22 is open on the database server.
Port 80 is closed on the database server.
The database server is located in front of the firewall in the demilitarized zone (DMZ).
The database sever was in a segmented portion of the local area network (LAN) that is
behind a firewall. - The database server is located in front of the firewall in the
demilitarized zone (DMZ).
A root cause analysis of a bank computer system reveals a land attack in which the
attacker sends spoofed synchronize (SYN) packets to a victim's internet protocol (IP)
address as both the source and destination IP address.
How should this problem be addressed?
Use SYN cookies
Block internet control message protocol (ICMP) traffic
Use a filter to detect traffic with identical source and destination addresses
Allow the use of system or root-level privileges for source and destination addresses -
Use a filter to detect traffic with identical source and destination addresses
A security administrator is analyzing the root cause of a series of system crashes. The
system administrator already analyzed the log files and found no record of intrusion
attempts or faulty programs.
What is a possible root cause of this problem?
Corrupt drivers
Existing firewalls
Weak passwords
Keystroke loggers - Corrupt drivers
A user's system is infected with malware. After talking with the user, the security
administrator learns that the user downloaded an attachment from an email message
right around the time that the log files show the malware was installed.
Which attack is a possible root cause of this problem?
Phishing
Waterhole
Dictionary
Data diddling - Phishing
A small hospital was affected by a WannaCry ransomware attack. After reviewing the
events surrounding the attack, a network administrator is required to make
recommendations to prevent this type of exploit.
Which recommendations should this network administrator suggest to prevent this type
of attack in the future?
Employ an three-tier demilitarized zone (DMZ) architecture
Update the appropriate patches for vulnerable systems
Use strong encryption protocols for network communications
Require two-factor authentication for all resources attempting to connect to the network
- Update the appropriate patches for vulnerable systems