WGU D315 PRACTICE TEST & PRE-ASSESSMENT
In the TCP/IP Model, which OSI layers are merged into the Application Layer? -
Answer -Session, Presentation, and Application Layers
The Presentaion layers role in the OSI model includes... - Answer -Formatting,
Encrypting and Decrypting Data
In which network topology do packets navigate device-to-device until reaching their
destination? - Answer -Ring
Which cloud deployment often utilizes exclusive (non-shared) hardware? - Answer -
Private Cloud
Which network type is commonly emplyoed for device interconnection within a single
building? - Answer -Local Area Network (LAN)
In Peer-to-Peer (P2P) architecture, configuration is : - Answer -Decentralized, with
each device requiring individual configuration
To verify a computers network connection and responsiveness, which command is
suitable for a network technician? - Answer -Ping
To link multiple buildings, which network type is utilized? - Answer -Campus Area
Network (CAN)
Which network type is used for short-distance device communication, such as
connecting wireless earbuds to a smartphone? - Answer -Personal Area Network
(PAN)
To inspect active TCP connections on a Windows PC, which command is appropriate
for a network admin? - Answer -Netstart
In a client/server architecture, the configuration is : - Answer -Centralized, with
configuration performed on a central server and disseminated to all devices.
How do OSI and TCP/IP model layer counts compare? - Answer -OSI has 7 layers;
TCP/IP has 4
Compared to Twisted Pair cables, Fiber Optic cables offer... - Answer -Enhanced data
transmission speed and extended cabling distance
Arouter primary purpose in a network is: - Answer -To route data packets between
multiple networks
,Put the OSI layers in the correct order starting with layer 7 and going down... - Answer -
1 - Application
2 - Presentation
3 - Session
4 - Transport
5 - Network
6 - Data Link
7 - Physical
All People Seem To Need Dominos Pizza
How is a community cloud defined? - Answer -Shared among multiple organizations
with similar objectives
At which OSI model layer does connection management (connection establishment,
maintenance, and teardown) with remote devices occur? - Answer -Session Layer
What does Infastructure as a Service (IaaS) offer consumers? - Answer -Computing
resources in a virtualized form over the internet
An IP Address functions at which OSI model layer? - Answer -Network Layer
To obtain the IP Address of a Windows machine, which command is necessary? -
Answer -Ipconfig
For wireless LAN connectivity, which device is typically used? - Answer -Wireless
Access Point (WAP)
In cloud computing, what defines the hybrid cloud model in terms of where IT assets are
located? - Answer -Mix of on-premises and cloud-based services for IT assets
Comparing device roles in P2P and client/server networks regarding resource sharing: -
Answer -P2P networks see devices solely as requesters, client/server as providers
Which network topology enables multiple paths between any two devices to safeguard
against link failure? - Answer -Mesh
Highlight a principal advantage of Software as a Service (SaaS). - Answer -No need for
individual installations or updates
Which command is employed for DNS resolution of a domain name to its IP address? -
Answer -Nslookup
To follow the journey of packets from origin to detination on Windows, which command
is applied? - Answer -Tracert
, Which situation are STP cables preferred over UTP cables? - Answer -In enviroments
with significant electromagnetic interfrerence
Identify a type of UDP cable... - Answer -Cat6 Cable
Within a client/server architecture, the role of client devices is to: - Answer -Request
and utilize server-provided services
At which OSI model layer does the MAC (Media Access Control) Address operate? -
Answer -Data link
What function does a firewall serve in a network? - Answer -Traffic filtration in
accordance with rule sets
A network topology where all nodes are connected to a central device is known as : -
Answer -Star
Identify the network type connecting computer networks and LANs across broad
geographical expanses: - Answer -Wide Area Network (WAN)
To display the mapping of IP Addresses to MAC Addresses on a WIndows system,
which command should be used? - Answer -Arp
Which cloud service model fits best for software development entities aiming to build
and test applications without handling the underlying Infastructure? - Answer -Platform
as a Service (PaaS)
For gigabit network compatiability, the minimum Ethernet cable category required is: -
Answer -Category 5e (CAT5e)
To obtain a Linux machine's IP Address, which command must a network admin
execute? - Answer -Ifconfig
What distingushes a public cloud model? - Answer -Accessible over the public internet
to anyone interested in subscribing
Define a Type 1 Hypervisor: - Answer -Direct hardware-level virtualization management
software
During a penetration test, the tester uses a well-known software tool to gain
unauthorized access to the network. This tool is considered... - Answer -An Exploit
When an attacker is inserting text that is too large to fit within a region of memory, what
type of attack are they trying to perform? - Answer -Buffer Overflow
In the TCP/IP Model, which OSI layers are merged into the Application Layer? -
Answer -Session, Presentation, and Application Layers
The Presentaion layers role in the OSI model includes... - Answer -Formatting,
Encrypting and Decrypting Data
In which network topology do packets navigate device-to-device until reaching their
destination? - Answer -Ring
Which cloud deployment often utilizes exclusive (non-shared) hardware? - Answer -
Private Cloud
Which network type is commonly emplyoed for device interconnection within a single
building? - Answer -Local Area Network (LAN)
In Peer-to-Peer (P2P) architecture, configuration is : - Answer -Decentralized, with
each device requiring individual configuration
To verify a computers network connection and responsiveness, which command is
suitable for a network technician? - Answer -Ping
To link multiple buildings, which network type is utilized? - Answer -Campus Area
Network (CAN)
Which network type is used for short-distance device communication, such as
connecting wireless earbuds to a smartphone? - Answer -Personal Area Network
(PAN)
To inspect active TCP connections on a Windows PC, which command is appropriate
for a network admin? - Answer -Netstart
In a client/server architecture, the configuration is : - Answer -Centralized, with
configuration performed on a central server and disseminated to all devices.
How do OSI and TCP/IP model layer counts compare? - Answer -OSI has 7 layers;
TCP/IP has 4
Compared to Twisted Pair cables, Fiber Optic cables offer... - Answer -Enhanced data
transmission speed and extended cabling distance
Arouter primary purpose in a network is: - Answer -To route data packets between
multiple networks
,Put the OSI layers in the correct order starting with layer 7 and going down... - Answer -
1 - Application
2 - Presentation
3 - Session
4 - Transport
5 - Network
6 - Data Link
7 - Physical
All People Seem To Need Dominos Pizza
How is a community cloud defined? - Answer -Shared among multiple organizations
with similar objectives
At which OSI model layer does connection management (connection establishment,
maintenance, and teardown) with remote devices occur? - Answer -Session Layer
What does Infastructure as a Service (IaaS) offer consumers? - Answer -Computing
resources in a virtualized form over the internet
An IP Address functions at which OSI model layer? - Answer -Network Layer
To obtain the IP Address of a Windows machine, which command is necessary? -
Answer -Ipconfig
For wireless LAN connectivity, which device is typically used? - Answer -Wireless
Access Point (WAP)
In cloud computing, what defines the hybrid cloud model in terms of where IT assets are
located? - Answer -Mix of on-premises and cloud-based services for IT assets
Comparing device roles in P2P and client/server networks regarding resource sharing: -
Answer -P2P networks see devices solely as requesters, client/server as providers
Which network topology enables multiple paths between any two devices to safeguard
against link failure? - Answer -Mesh
Highlight a principal advantage of Software as a Service (SaaS). - Answer -No need for
individual installations or updates
Which command is employed for DNS resolution of a domain name to its IP address? -
Answer -Nslookup
To follow the journey of packets from origin to detination on Windows, which command
is applied? - Answer -Tracert
, Which situation are STP cables preferred over UTP cables? - Answer -In enviroments
with significant electromagnetic interfrerence
Identify a type of UDP cable... - Answer -Cat6 Cable
Within a client/server architecture, the role of client devices is to: - Answer -Request
and utilize server-provided services
At which OSI model layer does the MAC (Media Access Control) Address operate? -
Answer -Data link
What function does a firewall serve in a network? - Answer -Traffic filtration in
accordance with rule sets
A network topology where all nodes are connected to a central device is known as : -
Answer -Star
Identify the network type connecting computer networks and LANs across broad
geographical expanses: - Answer -Wide Area Network (WAN)
To display the mapping of IP Addresses to MAC Addresses on a WIndows system,
which command should be used? - Answer -Arp
Which cloud service model fits best for software development entities aiming to build
and test applications without handling the underlying Infastructure? - Answer -Platform
as a Service (PaaS)
For gigabit network compatiability, the minimum Ethernet cable category required is: -
Answer -Category 5e (CAT5e)
To obtain a Linux machine's IP Address, which command must a network admin
execute? - Answer -Ifconfig
What distingushes a public cloud model? - Answer -Accessible over the public internet
to anyone interested in subscribing
Define a Type 1 Hypervisor: - Answer -Direct hardware-level virtualization management
software
During a penetration test, the tester uses a well-known software tool to gain
unauthorized access to the network. This tool is considered... - Answer -An Exploit
When an attacker is inserting text that is too large to fit within a region of memory, what
type of attack are they trying to perform? - Answer -Buffer Overflow