WGU D782 Network Taken by: Wiseman
Architecture & Cloud
Score 100%
Computing
1. Describe the implications of using an open network for data security.
Open networks automatically encrypt all user data.
Using an open network can expose data to potential interception
since it does not encrypt information.
Using an open network guarantees secure data transmission.
Open networks are only used for public access without any risks.
2. Describe the role of infrastructure in networking and cloud computing.
Infrastructure serves as the foundational framework that supports
the operation and management of networking and cloud computing
systems.
Infrastructure is the term for user interfaces in cloud applications.
Infrastructure refers to the software applications used in networking.
Infrastructure is solely responsible for data storage in cloud
computing.
3. An organizational disaster recovery plan typically refers to:
Securing adequate insurance to support recovery effort if needed.
Plans for training, conducting drills and testing equipment.
Procedures to recover business operations in the event of a disaster.
Internal and external emergency communications in the event of a
disaster.
,6/26/25, 10:04 PM Networking and Cloud Computing Practice Test - results
4. In a scenario where a user accidentally overwrites an important document,
how would file versioning assist them?
It would create a backup of the document on a different device.
It would permanently delete the overwritten document.
It would allow the user to restore the document to a previous
version before it was overwritten.
It would notify the user about the overwrite without any recovery
options.
5. Describe how USB tethering creates an ad-hoc network between devices.
USB tethering requires a router to establish an ad-hoc network.
USB tethering is a method of connecting multiple devices to a single
Wi-Fi network.
USB tethering allows a phone to share its internet connection with
another device via a direct USB connection, forming an ad-hoc
network.
USB tethering connects devices wirelessly using Bluetooth
technology.
6. What is the difference between tethering and a mobile hotspot?
Tethering uses Wi-Fi, while a mobile hotspot uses Bluetooth.
Tethering uses USB, while a mobile hotspot uses Wi-Fi.
Tethering uses Bluetooth, while a mobile hotspot uses Wi-Fi.
There is no difference.
,6/26/25, 10:04 PM Networking and Cloud Computing Practice Test - results
7. Why is it essential to make products and services accessible to a wider
audience?
Accessibility does not affect the market reach of a product.
Making products accessible allows for a broader audience and
ensures inclusivity for disabled individuals.
Accessible products are typically more expensive to produce.
Accessibility is only necessary for government services.
8. Describe the purpose of hardware accessibility devices in the context of user
interaction with technology.
Hardware accessibility devices are used to improve cloud computing
efficiency.
Hardware accessibility devices help individuals with disabilities
interact with technology more effectively.
Hardware accessibility devices are primarily used for data storage.
Hardware accessibility devices enhance network security.
9. What does 'Accessibility' in UI design primarily focus on?
Ensuring the interface is usable in certain environments
Making the design accessible to people with a wide range of
abilities and disabilities
Ensuring that interfaces are functional even when the Internet is not
available
Using built-in features on mobile devices and computers to improve
user experience
, 6/26/25, 10:04 PM Networking and Cloud Computing Practice Test - results
10. Describe the role of communication channels in engaging stakeholders
effectively.
Communication channels facilitate interaction and information
sharing between organizations and their stakeholders.
Communication channels are irrelevant in stakeholder engagement.
Communication channels only refer to social media platforms.
Communication channels are primarily used for data encryption.
11. What is the primary purpose of file versioning?
To identify a file as a draft or final release
To enable multiple users to collaborate
To identify dates of creation
To enable recovery of earlier copies
12. If a company experiences a data breach that results in local data loss, how
can cloud storage assist in their recovery efforts?
By preventing any future data breaches through encryption.
By offering a faster internet connection for data retrieval.
By allowing the company to download previous versions of their
data from the cloud.
By providing a physical backup of all data on-site.
13. If a company decides to switch from traditional software installations to
cloud computing, what is a potential benefit they might experience?
Dependency on local hardware for software functionality.
Higher costs associated with software licenses.