WGU C172 Network and Security Foundations Pre-Assessment Questions and answers, 100% Accurate. VERIFIED.
WGU C172 Network and Security Foundations Pre-Assessment Questions and answers, 100% Accurate. VERIFIED. A very popular intrusion approach thanks to its success rate is what? - -Social Engineering The physical architecture of a computer network is known as its ____. - -Topologies The 802.11 wireless LAN uses what in order to identify the wireless traffic that is permitted to connect? - -SSID PING uses ____to verify a network connection. - -ICMP Which of the following is not a function of a bridge? - -To forward traffic based on a layer 3 address You have a network ID of 192.168.55.0 and you need to divide it into multiple subnets. You need at least 30 host ID's in each subnet. What is the maximum number of subnets you could have? - -8 How can wireless clients find the network they are to connect to? - -Beacons are used What type of attack uses known passwords and many variations? - -Dictionary Which of the following is the order of fields in an Ethernet (DIX) frame after the Preamble? - - Destination address, Source address, Type/Length, Data, Pad, FCS How many bits are in a subnet mask? - -32 A type of DOS against a wireless network is called what? - -Jamming How does a switch decrease network traffic? (Choose two.) - -1. D
Written for
Document information
- Uploaded on
- November 2, 2023
- Number of pages
- 5
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
wgu c172 network and security foundations pre ass
Also available in package deal