WGU C845
Which9of9the9following9type9of9cryptography9is9used9when9both9parties9use9the9same9
key9to9communicate9securely9with9each9other?
A.9Symmetric9Key9Cryptography
B.9PKI9-9Public9Key9Infrastructure
C.9Diffie-Hellman
D.9DSS9-9Digital9Signature9Standard9-9ans✔A.9Symmetric9Key9Cryptography
Which9of9the9following9is9true9of9network9security?
A.9A9firewall9is9a9not9a9necessity9in9today's9connected9world.
B.9A9firewall9is9a9necessity9in9today's9connected9world.
C.9A9whitewall9is9a9necessity9in9today's9connected9world.
D.9A9black9firewall9is9a9necessity9in9today's9connected9world.9-
9ans✔B.9A9firewall9is9a9necessity9in9today's9connected9world.
What9is9called9the9access9protection9system9that9limits9connections9by9calling9back9th
e9number9of9a9previously9authorized9location?
A.9Sendback9systems
B.9Callback9forward9systems
C.9Callback9systems
D.9Sendback9forward9systems9-9ans✔C.9callback9systems
What9is9a9decrease9in9amplitude9as9a9signal9propagates9along9a9transmission9mediu
m9best9known9as?
A.9Crosstalk
B.9Noise
C.9Delay9distortion
D.9Attenuation9-9ans✔D.9Attenuation
Which9device9acting9as9a9translator9is9used9to9connect9two9networks9or9applications9fr
om9layer949up9to9layer979of9the9ISO/OSI9Model?
A.9Bridge
, B.9Repeater
C.9Router
D.9Gateway9-9ans✔D.9gateway
In9which9layer9of9the9OSI9Model9are9connection-
oriented9protocols9located9in9the9TCP/IP9suite9of9protocols?
A.9Transport9layer
B.9Application9layer
C.9Physical9layer
D.9Network9layer9-9ans✔A.9Transport9layer
Which9of9the9following9is9a9telecommunication9device9that9translates9data9from9digital9
to9analog9form9and9back9to9digital?
A.9Multiplexer
B.9Modem
C.9Protocol9converter
D.9Concentrator9-9ans✔B.9Modem
Which9of9the9following9transmission9media9would9NOT9be9affected9by9cross9talk9or9int
erference?
A.9Copper9cable
B.9Radio9System
C.9Satellite9radiolink
D.9Fiber9optic9cables9-9ans✔D.9Fiber9optic9cables
What9is9called9an9attack9where9the9attacker9spoofs9the9source9IP9address9in9an9ICMP
9ECHO9broadcast9packet9so9it9seems9to9have9originated9at9the9victim's9system,
in9order9to9flood9it9with9REPLY9packets?
A.9SYN9Flood9attack
B.9Smurf9attack
C.9Ping9of9Death9attack
D.9Denial9of9Service9(DOS)9attack9-9ans✔B.9smurf9attack
What9is9the9main9difference9between9a9Smurf9and9a9Fraggle9attack?
A.9A9Smurf9attack9is9ICMP-based9and9a9Fraggle9attack9is9UDP-based.
B.9A9Smurf9attack9is9UDP-based9and9a9Fraggle9attack9is9TCP-based.
C.9Smurf9attack9packets9cannot9be9spoofed.
D.9A9Smurf9attack9is9UDP-based9and9a9Fraggle9attack9is9ICMP-based.9-
9ans✔A.9A9Smurf9attack9is9ICMP-based9and9a9Fraggle9attack9is9UDP-based.
Why9are9coaxial9cables9called9"coaxial"?
A.9it9includes9two9physical9channels9that9carries9the9signal9surrounded9(after9a9layer9o
f9insulation)9by9another9concentric9physical9channel,9both9running9along9the
same9axis.
B.9it9includes9one9physical9channel9that9carries9the9signal9surrounded9(after9a9layer9of
9insulation)9by9another9concentric9physical9channel,9both9running9along9the