Network and Security Foundations Practice
Test (WGU C172) Exam Questions And
Answers 100% Pass
Two or more computers connected together over a wide geographical area (e.g. county,
country, globe). What type of network is this? - ANS WAN
Which of the following cloud computing solutions will deliver software applications to a client
either over the internet or on a local area network? - ANS SaaS
With regards to AAA, ________ defines what the user can access and in what manner. -
ANS Authorization
What type of attack targets an SQL database using the input field of a user? - ANS SQL
injection
Which network is this? I allow computers to communicate with each other in the same building
- ANS LAN
Reports on a user's access and logs of successful and unsuccessful connection attempts are
which part of AAA? - ANS Accounting
What should we be concerned with keeping up to date? - ANS Office Suites, Browser Plugins,
Anti-virus
, ©EVERLY 2025 ALL RIGHTS RESERVED
Barry is working with his organization's platforms team to select a virtualization approach for
use in their data center. To provide stronger security, he would like to select a hypervisor that
runs directly on bare metal hardware without an intervening host operating system. What type
of hypervisor should he choose? - ANS Type 1
You have implemented a network where each device provides all other devices on the network
with access to shared files. What type of network do you have? - ANS Peer-to-Peer
Tom would like to determine what network ports are open on a newly commissioned server.
Which one of the following tools is best suited for that task? - ANS Nmap
Which of the following geographic network types are typically contained within city or county
limits? - ANS Metropolitan Area Network (MAN)
Which of the following threat actors seeks to defame, shed light on, or cripple an organization
or government? - ANS Black Hat
Which of the following describes a man-in-the-middle attack? - ANS A false server intercepts
communications from a client by impersonating the intended server.
Alice would like to send a message to Bob using an asymmetric cryptography algorithm. What
key should she use to encrypt the message? - ANS Bob's public key
With regards to AAA, _______ confirms that the user is how he or she claims to be. -
ANS Authentication
Which type of fiber cable is normally used to connect two buildings that are several miles
apart? - ANS Single-mode