Information Technology > QUESTIONS & ANSWERS > WGU C172 Pre-Assessment Questions and Answers with Complete Solutions (All)
WGU C172 Pre-Assessment Questions and Answers with Complete Solutions Which OSI layer is related to the function of the IP protocol suite? ✔✔Network Which OSI layer is responsible for organizin... g how bits are passed over the physical layer between devices within the same collision domain? ✔✔Data link Which OSI layer would define the scope of a protocol that makes sure packets of data are received correctly and resends them if they are not? ✔✔Transport Which protocol suite performs functions of OSI layer 4? ✔✔TCP Which type of Ethernet cable can maintain 10Gbps transmission speeds through the course of its maximum 100-meter length? ✔✔CAT 6a Which device is used to organize network cables as they run between switches and other network devices? ✔✔Patch panel Which networking standard uses UTP cable and CSMA/CD to manage connected devices' access to the wire? ✔✔Ethernet What facilitates network functions at the data link and physical layers by use of a unique MAC address? ✔✔NIC Which network device is used to connect two or more network segments by performing OSI layer 3 functions like packet-forwarding? ✔✔Router Which network device can be used as shared storage for all member nodes of a LAN? ✔✔File server Which device is responsible for implementing network address translation (NAT)? ✔✔Router Which command produces the following output? Non-authoritative answer: Name: www.google.com Address: 172.217.11.132 ✔✔nslookup Which network protocol allows a user to authenticate to a remote server, navigate the server's file structure, and upload and download files? ✔✔ftp Which network diagnostic tool displays the path packets take between two endpoints? ✔✔traceroute Which network type is used to wire multiple PCs to a home router? ✔✔LAN An office's infrastructure connects network devices and printers through a central access point without the use of cabling. Which network type does this office use? ✔✔WLAN What type of medium is commonly used within a 1000 Mbps Ethernet network? ✔✔CAT5e Which network topology is shown in the following diagram? ✔✔Full mesh Which network topology is being implemented when each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node? ✔✔Ring In which physical LAN topology are nodes connected to each other with a backbone cable that loops around and ends at the same point it started? ✔✔Ring Which OSI layer ensures error-free packets? ✔✔Transport Which topology uses a switch or hub to connect to all devices in the same network? ✔✔Star Which cloud model provides an exclusive cloud computing service environment that is shared between two or more organizations? ✔✔Community Which service offering provides the tools and environment for application development and testing? ✔✔PaaS Which type of software is used to provide virtualization? ✔✔Hypervisor A user that does not want to be identified while communicating on a network uses an application to alter the computer's identity. Which type of exploit is being perpetrated? ✔✔Spoofing An attacker attempts to misdirect traffic on a network back to the attacker by corrupting the network computer's cache of IP address to MAC address mappings that are cached. Which exploit is the attacker perpetrating? ✔✔ARP poisoning Which exploit actually breaches the physical medium or uses devices to monitor signals from outside the physical medium itself? ✔✔Wiretapping Which type of attack can overwhelm a web server by inserting more data into a web form than the system was configured to hold? ✔✔Buffer overflow Which type of attack sends an email claiming to be from a reputable business in order to entice the recipient to provide sensitive information? ✔✔Phishing A user on a network is planning to launch an exploit against a coworker in a neighboring department. The user needs to identify the IP address of a coworker in the desired department. Which tool or utility will allow the user to watch network traffic in real time to identify a target? ✔✔Sniffer Which type of attack exploits an unpatched software vulnerability? ✔✔Zero-day Which network vulnerability can be reduced by adding biometric authentication devices? ✔✔Weak passwords A company has the policy that all new user passwords are P@ssw0rd but does not require new users to change their password. An employee randomly tries a coworker's account with the new user password to see if they can log in as the coworker. Which type of vulnerability does this create? ✔✔Default password An employee that does not want to miss emails from important clients sets up her cellular smartphone to allow her to check email. Unfortunately, she does not install antivirus software on the cellular phone. What type of vulnerability is represented? ✔✔BYOD/Mobile What is required to establish a secure connection to a remote network over an insecure link? ✔✔Virtual Private Network (VPN) service Which type of device can be used to ensure a [Show More]
Last updated: 1 year ago
Preview 1 out of 9 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Add to cartInstant download
We Accept:
WGU C172 Network and Security – Foundations Bundled Questions and Answers Latest Update Already Passed
By Nutmegs 1 year ago
$20
10
Connected school, study & course
About the document
Uploaded On
Aug 16, 2022
Number of pages
9
Written in
This document has been written for:
Uploaded
Aug 16, 2022
Downloads
0
Views
74
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·