100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU C172 NETWORK AND SECURITY FOUNDATIONS PA AND OA EXAM 2026 COMPREHENSIVE STUDY

Puntuación
-
Vendido
-
Páginas
41
Grado
A+
Subido en
21-01-2026
Escrito en
2025/2026

WGU C172 NETWORK AND SECURITY FOUNDATIONS PA AND OA EXAM 2026 COMPREHENSIVE STUDY

Institución
WGU C172 NETWORK AND SECURITY FOUNDATIONS
Grado
WGU C172 NETWORK AND SECURITY FOUNDATIONS











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU C172 NETWORK AND SECURITY FOUNDATIONS
Grado
WGU C172 NETWORK AND SECURITY FOUNDATIONS

Información del documento

Subido en
21 de enero de 2026
Número de páginas
41
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU C172 NETWORK AND SECURITY
FOUNDATIONS PA AND OA EXAM 2026
COMPREHENSIVE STUDY

◉ Confidentiality. Answer: Making sure only approved users have
access to data


◉ Integrity. Answer: Data Integrity and Source Integrity


◉ Availability. Answer: Ensuring data is accessible by approved
users when needed


◉ Data Integrity. Answer: Assurance that information has not been
tampered with or corrupted between the source and the end user


◉ Source Integrity. Answer: Assurance that the sender of the
information is who it is supposed to be


◉ PPT. Answer: People, Processes and Technology is a holistic
approach to securing an organization's information


◉ Confidentiality Methods/Tools. Answer: Encryption and User
access control

,◉ Integrity Methods/Tools. Answer: Encryption ‐ User access
control ‐ File permissions ‐ Version control systems/backups


◉ Availability Methods/Tools. Answer: Offsite data storage/backups
‐ Redundant architecture (hardware and software)


◉ Encryption. Answer: Passwords, encryption keys


◉ User Access Control (UAC). Answer: Controlling which users have
access to networks and what level of access each user has


◉ File permissions. Answer: Customizable settings that only allow
certain users to view and edit files


◉ Hot Site. Answer: Has all the equipment needed for the enterprise
to continue operation, including office space and furniture,
telephone jacks and computer equipment.


◉ Cold Site. Answer: Is a similar type of disaster recovery service
that provides office space, but the customer provides and installs all
the equipment needed to continue operations, and is less expensive,
but it takes longer to get an enterprise in full operation after the
disaster.

,◉ Warm Site. Answer: Is a compromise between hot and cold. These
sites will have hardware and connectivity already established,
though on a smaller scale than the original production site or even a
hot site. These sites might have backups on hand, but they may not
be complete and may be between several days and a week old. The
recovery will be delayed while backup tapes are delivered to the site,
or network connectivity is established and data is recovered from a
remote backup site


◉ Threat. Answer: An attacker or piece of malware that desires
and/or is able to cause harm to a target


◉ Vulnerability. Answer: Flaw in an environment that an attacker
can use to harm the target


◉ Exploit. Answer: The method by which an attacker can use a
vulnerability


◉ Risk. Answer: The potential that a threat will exploit a
vulnerability


◉ It is a network of users that share computer resources in a limited
area.. Answer: LAN

, ◉ Local Area Network. Answer: LAN


◉ How are Local Area Networks defined?. Answer: In terms of
protocol and the topology used for accessing the network.


◉ A set of rules established for users to exchange information.
Answer: Protocol


◉ The network architecture used to interconnect the networking
equipment.. Answer: Topology


◉ What are the most common topologies for LANs?. Answer: Ring,
Bus, and Star


◉ Uses a token that is placed in the data channel and circulates
around the ring.. Answer: Token Ring topology


◉ A deterministic network. Answer: Token Ring Topology


◉ Each station connected to the network ensures access for
transmission of its messages at regular or fixed time intervals.
Answer: Deterministic
$12.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
FocusFile7 Harvard University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
44
Miembro desde
7 meses
Número de seguidores
2
Documentos
21560
Última venta
1 día hace
FocusFile7

Welcome to FocusFile, your inspiring hub for academic excellence! Just like your favorite café where every sip brings comfort, FocusFile is designed to be your go-to space for clear thinking, deep focus, and study success. Here at FocusFile, I believe learning isn’t just about cramming it’s about clarity, growth, and building the confidence to conquer any challenge. That’s why you’ll find a handpicked collection of top-notch, easy-to-digest study materials, smart summaries, and guides tailored to a wide range of subjects and learning styles. Whether you're gearing up for exams, brushing up on class notes, or just need that extra push, FocusFile has you covered. From quick-reference sheets to deep-dive notes, there’s something here for every learner whether you're a visual thinker, a bullet-point lover, or someone who thrives on quick, impactful insights. Think of FocusFile as your academic sanctuary, a place where productivity meets peace of mind. So grab your favorite drink, settle in, and let’s sharpen your focus and fuel your success, one file at a time. Thanks for making FocusFile your study partner. Let’s unlock your full potential together!

Lee mas Leer menos
4.3

4 reseñas

5
2
4
1
3
1
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes