Information Technology > QUESTIONS & ANSWERS > WGU Network and Security - Foundations - C172 - Most Import Materials for Final Objective Assessment (All)

WGU Network and Security - Foundations - C172 - Most Import Materials for Final Objective Assessment Test

Document Content and Description Below

WGU Network and Security - Foundations - C172 - Most Import Materials for Final Objective Assessment Test 802.11a/Wireless-A ✔✔wireless 5GHz - 54Mbps - *75ft* 802.11b/Wireless-B ✔✔wireles... s 2.4GHz - *11Mbps* - 100-150ft 802.11g/Wireless-G ✔✔2.4GHz - *54Mbps - 150ft* 802.11ac/Wireless-AC ✔✔5GHz - *1.3Gbps* 802.11n/Wireless-N ✔✔2.4GHz - *200+Mbps* 2.4GHz ✔✔Frequency ranges of 802.11G/802.11B 5GHz ✔✔Frequency ranges of 802.11AC/802.11A Application Layer ✔✔Layer 7 in the OSI model. Support for applications. Examples: HTTP, FTP, SMTP Presentation Layer ✔✔Layer 6 in the OSI model. Protocol conversion, data translation. Examples: ASCII, JPEG Session Layer ✔✔Layer 5 in the OSI model. Establishes, manages, and terminates sessions. Examples: NFS, SQL Transport Layer ✔✔Layer 4 in the OSI model. Ensures error-free packets. Examples: TCP, UDP Network Layer ✔✔Layer 3 in the OSI model. Provides routing decisions. Examples: IP, IPX Data Link Layer ✔✔Layer 2 in the OSI model. Provides for the flow of data. Examples: MAC addresses. Physical Layer ✔✔Layer 1 in the OSI model. Signals and media. Examples: NICs, twisted-pair cable, fiber. OSI model ✔✔Application, Presentation, Session, Transport, Network, Data Link, Physical. (*P*lease *D*o not *T*hrough *S*asuage *P*izza *A*way) Application Layer (TCP/IP) ✔✔Defines the applications used to process requests and which ports and sockets are used Transport Layer (TCP/IP) ✔✔Defines the type of connection established between hosts and how acknowledgements are sent Internet Layer (TCP/IP) ✔✔Defines the protocols used for addressing and routing the data packets Network interface Layer (TCP/IP) ✔✔Defines how the host connects to the network The well-known ports ✔✔TCP/IP Ports 1-1023 Registered ports ✔✔TCP/IP Ports 1024-49,151 Private ports ✔✔TCP/IP Ports 49,152-65,535 Social Engineering ✔✔A process by which an intruder obtains enough information from people to gain access to the network Password Cracking ✔✔An attack in which the attacker tries to guess the user's password Dictionary Attack ✔✔An attack that uses known passwords and many variations (upper- and lowercase and combinations) to try to log in to an account Brute-Force Attack ✔✔An attack in which the attacker uses every possible combination of characters to guess the password Packet Sniffing ✔✔A technique in which the contents of data packets are watched Man-in-the-Middle Attack/MITM ✔✔An attack in which an attacker can seamlessly place itself in the middle of a conversation between others in order to become the recipient of all information sent by victim computers ARP Cache Poisoning ARP Cache Poisoning Attack ✔✔An attack in which an attacker changes the MAC addresses of the ARP cache, or "poisons the ARP cache" of victims to the MAC address of the attacker so that conversations get redirected to the attacker Evil Twin Attack ✔✔A situation in which a rogue wireless access point poses as a legitimate one by broadcasting a legitimate SSID and eavesdrops on the wireless network Session Hijacking ✔✔Exploiting web session control by stealing a session cookie and using it to establish a session with a remote server that still thinks the session is valid Buffer Overflow ✔✔A situation that occurs when a program tries to put more data into a buffer than it was configured to hold Zero-Day Attack ✔✔An attack that exploits a software vulnerability that is unknown to the developer Denial of Service Attack/DoS ✔✔An attack in which service is denied to a computer, network, or server Permanent DOS Attack/PDoS ✔✔A malicious attack that aims to sabotage hardware and render it useless 14 ✔✔Amount of channels implemented with 802.11 DSSS 3 ✔✔Non overlapping 802.11 DSSS chan [Show More]

Last updated: 1 year ago

Preview 1 out of 5 pages

Add to cart

Instant download

document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

Also available in bundle (1)

WGU C172 Network and Security – Foundations Bundled Questions and Answers Latest Update Already Passed

WGU C172 Network and Security – Foundations Bundled Questions and Answers Latest Update Already Passed

By Nutmegs 1 year ago

$20

10  

Reviews( 0 )

$10.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
191
0

Document information


Connected school, study & course


About the document


Uploaded On

Aug 16, 2022

Number of pages

5

Written in

Seller


seller-icon
Nutmegs

Member since 3 years

578 Documents Sold


Additional information

This document has been written for:

Uploaded

Aug 16, 2022

Downloads

 0

Views

 191

Document Keyword Tags


$10.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·