Information Technology > QUESTIONS & ANSWERS > WGU C172 Pre-Assessment Questions and Answers with Complete Solutions (All)

WGU C172 Pre-Assessment Questions and Answers with Complete Solutions

Document Content and Description Below

WGU C172 Pre-Assessment Questions and Answers with Complete Solutions Which OSI layer is related to the function of the IP protocol suite? ✔✔Network Which OSI layer is responsible for organizin... g how bits are passed over the physical layer between devices within the same collision domain? ✔✔Data link Which OSI layer would define the scope of a protocol that makes sure packets of data are received correctly and resends them if they are not? ✔✔Transport Which protocol suite performs functions of OSI layer 4? ✔✔TCP Which type of Ethernet cable can maintain 10Gbps transmission speeds through the course of its maximum 100-meter length? ✔✔CAT 6a Which device is used to organize network cables as they run between switches and other network devices? ✔✔Patch panel Which networking standard uses UTP cable and CSMA/CD to manage connected devices' access to the wire? ✔✔Ethernet What facilitates network functions at the data link and physical layers by use of a unique MAC address? ✔✔NIC Which network device is used to connect two or more network segments by performing OSI layer 3 functions like packet-forwarding? ✔✔Router Which network device can be used as shared storage for all member nodes of a LAN? ✔✔File server Which device is responsible for implementing network address translation (NAT)? ✔✔Router Which command produces the following output? Non-authoritative answer: Name: www.google.com Address: 172.217.11.132 ✔✔nslookup Which network protocol allows a user to authenticate to a remote server, navigate the server's file structure, and upload and download files? ✔✔ftp Which network diagnostic tool displays the path packets take between two endpoints? ✔✔traceroute Which network type is used to wire multiple PCs to a home router? ✔✔LAN An office's infrastructure connects network devices and printers through a central access point without the use of cabling. Which network type does this office use? ✔✔WLAN What type of medium is commonly used within a 1000 Mbps Ethernet network? ✔✔CAT5e Which network topology is shown in the following diagram? ✔✔Full mesh Which network topology is being implemented when each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node? ✔✔Ring In which physical LAN topology are nodes connected to each other with a backbone cable that loops around and ends at the same point it started? ✔✔Ring Which OSI layer ensures error-free packets? ✔✔Transport Which topology uses a switch or hub to connect to all devices in the same network? ✔✔Star Which cloud model provides an exclusive cloud computing service environment that is shared between two or more organizations? ✔✔Community Which service offering provides the tools and environment for application development and testing? ✔✔PaaS Which type of software is used to provide virtualization? ✔✔Hypervisor A user that does not want to be identified while communicating on a network uses an application to alter the computer's identity. Which type of exploit is being perpetrated? ✔✔Spoofing An attacker attempts to misdirect traffic on a network back to the attacker by corrupting the network computer's cache of IP address to MAC address mappings that are cached. Which exploit is the attacker perpetrating? ✔✔ARP poisoning Which exploit actually breaches the physical medium or uses devices to monitor signals from outside the physical medium itself? ✔✔Wiretapping Which type of attack can overwhelm a web server by inserting more data into a web form than the system was configured to hold? ✔✔Buffer overflow Which type of attack sends an email claiming to be from a reputable business in order to entice the recipient to provide sensitive information? ✔✔Phishing A user on a network is planning to launch an exploit against a coworker in a neighboring department. The user needs to identify the IP address of a coworker in the desired department. Which tool or utility will allow the user to watch network traffic in real time to identify a target? ✔✔Sniffer Which type of attack exploits an unpatched software vulnerability? ✔✔Zero-day Which network vulnerability can be reduced by adding biometric authentication devices? ✔✔Weak passwords A company has the policy that all new user passwords are P@ssw0rd but does not require new users to change their password. An employee randomly tries a coworker's account with the new user password to see if they can log in as the coworker. Which type of vulnerability does this create? ✔✔Default password An employee that does not want to miss emails from important clients sets up her cellular smartphone to allow her to check email. Unfortunately, she does not install antivirus software on the cellular phone. What type of vulnerability is represented? ✔✔BYOD/Mobile What is required to establish a secure connection to a remote network over an insecure link? ✔✔Virtual Private Network (VPN) service Which type of device can be used to ensure a [Show More]

Last updated: 1 year ago

Preview 1 out of 9 pages

Add to cart

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

We Accept:

We Accept

Also available in bundle (1)

WGU C172 Network and Security – Foundations Bundled Questions and Answers Latest Update Already Passed

WGU C172 Network and Security – Foundations Bundled Questions and Answers Latest Update Already Passed

By Nutmegs 1 year ago

$20

10  

Reviews( 0 )

$10.00

Add to cart

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
74
0

Document information


Connected school, study & course


About the document


Uploaded On

Aug 16, 2022

Number of pages

9

Written in

Seller


seller-icon
Nutmegs

Member since 3 years

578 Documents Sold


Additional information

This document has been written for:

Uploaded

Aug 16, 2022

Downloads

 0

Views

 74

Document Keyword Tags


$10.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·