100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Network and Security Foundations Practice Test (WGU C172) Study Guide Top-Rated 2024

Rating
-
Sold
1
Pages
5
Grade
A
Uploaded on
26-12-2023
Written in
2023/2024

Two or more computers connected together over a wide geographical area (e.g. county, country, globe). What type of network is this? - WAN Which of the following cloud computing solutions will deliver software applications to a client either over the internet or on a local area network? - SaaS With regards to AAA, ________ defines what the user can access and in what manner. - Authorization What type of attack targets an SQL database using the input field of a user? - SQL injection Which network is this? I allow computers to communicate with each other in the same building - LAN Reports on a user's access and logs of successful and unsuccessful connection attempts are which part of AAA? - Accounting What should we be concerned with keeping up to date? - Office Suites, Browser Plugins, Anti-virus Barry is working with his organization's platforms team to select a virtualization approach for use in their data center. To provide stronger security, he would like to select a hypervisor that runs directly on bare metal hardware without an intervening host operating system. What type of hypervisor should he choose? - Type 1 You have implemented a network where each device provides all other devices on the network with access to shared files. What type of network do you have? - Peer-to-Peer Tom would like to determine what network ports are open on a newly commissioned server. Which one of the following tools is best suited for that task? - Nmap Which of the following geographic network types are typically contained within city or county limits? - Metropolitan Area Network (MAN) Which of the following threat actors seeks to defame, shed light on, or cripple an organization or government? - Black Hat

Show more Read less
Institution
(WGU C172)
Course
(WGU C172)

Content preview

Network and Security Foundations Practice Test (WGU C172) Study Guide Top-Rated 2024 Two or more computers connected together over a wide geographical area (e.g. county, country, globe). What type of network is this? - WAN Which of the following cloud computing solutions will deliver software applications to a client either over the internet or on a local area network? - SaaS With regards to AAA, ________ defines what the user can access and in what manner. - Authorization What type of attack targets an SQL database using the input field of a user? - SQL injection Which network is this? I allow computers to communicate with each other in the same building - LAN Reports on a user's access and logs of successful and unsuccessful connection attempts are which part of AAA? - Accounting What should we be concerned with keeping up to date? - Office Suites, Browser Plugins, Anti -virus Barry is working with his organization's platforms team to select a virtualization approach for use in their data center. To provide stronger security, he would like to select a hypervisor that runs directly on bare metal hardware without an intervening ho st operating system. What type of hypervisor should he choose? - Type 1 You have implemented a network where each device provides all other devices on the network with access to shared files. What type of network do you have? - Peer -to-Peer Tom would like to determine what network ports are open on a newly commissioned server. Which one of the following tools is best suited for that task? - Nmap Which of the following geographic network types are typically contained within city or county limits? - Metropolitan Area Network (MAN) Which of the following threat actors seeks to defame, shed light on, or cripple an organization or government? - Black Hat Which of the following describes a man -in-the-middle attack? - A false server intercepts communications from a client by impersonating the intended server. Alice would like to send a message to Bob using an asymmetric cryptography algorithm. What key should she use to encrypt the message? - Bob's public key With regards to AAA, _______ confirms that the user is how he or she claims to be. - Authentication Which type of fiber cable is normally used to connect two buildings that are several miles apart? - Single -mode Which of the following are transport layer protocols? - TCP and UDP In what type of attack does the attacker attempt to send unauthorized commands to a back -end database through a web application? - SQL Injection Kyle is concerned that an attacker is probing his network and would like to use a decoy system to attract the attacker and analyze his or her activity. What type of tool would best meet Kyle's needs? - Honeypot In the OSI model, what is the primary function of the Network layer? - Routes data between networks James is working with his organization's platforms team to select a virtualization approach for use on test systems managed by developers. He is looking for a hypervisor that can run on top of the Windows operating system already installed on their laptops . What type of hypervisor is James looking for? - Type 2 You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use? - Circuit -level You were recently hired by a small start -up company. The company has no plans to setup their own datacenter. You have been asked to find a cloud service that would provide several physical servers or virtual machines that the company would be able to insta ll whatever operating systems and applications they need. Which cloud service model should you use? - Iaas A company is concerned with traffic that flows through the network. There is a concern that there may be malware that exists that is not being blocked or eradicated by antivirus. What technology can be put in place to detect potential malware traffic on th e network? - IDS A wireless deauthentication attack is an example of which type of attack: - Denial of Service Attack

Written for

Institution
(WGU C172)
Course
(WGU C172)

Document information

Uploaded on
December 26, 2023
Number of pages
5
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • wgu c172

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
PossibleA Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
1016
Member since
5 year
Number of followers
650
Documents
13060
Last sold
5 days ago
POSSIBLEA QUALITY UPDATED EXAMS

Choose quality study materials for nursing schools to ensure success in your studies and future career. "Welcome to PossibleA - your perfect study assistant! Here you will find Quality sheets, study materials, exams, quizzes, tests, and notes to prepare for exams and study successfully. Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers and checked for quality. Our quality sheets are an easy and quick way to remember key points and definitions. And our study materials, tests, and quizzes will help you absorb the material and prepare for exams. Our store also has notes and lecture summaries that will help you save time and make the learning process more efficient.

Read more Read less
3.9

145 reviews

5
75
4
25
3
22
2
1
1
22

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions