Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C172..docx

Beoordeling
-
Verkocht
-
Pagina's
13
Cijfer
A+
Geüpload op
03-05-2024
Geschreven in
2023/2024

Application Layer-7 - correct answer This layer is responsible for network applications (like HTTP or FTP) and their production of data to be transferred over the network Presentation Layer-6 - correct answer This layer is responsible for translating data from the application layer into the format required to transmit the data over the network as well as encrypting the data for security if encryption is used. Session Layer-5 - correct answer This layer is responsible for connection establishment, session maintenance, and authentication. Transport Layer-4 - correct answer This layer provides services to the application layer and receives services from the network layer. It is responsible for the reliable delivery of data. It segments and reassembles data in the correct order for it to be sent to the receiving device Network Layer-3 - correct answer This layer is responsible for the transmission of data between hosts in different networks as well as routing of data packets. This layer is implemented through the use of devices such as routers and some switches. Data Link Layer-2 - correct answer This layer is responsible for the error-free delivery of data to the receiving device or node. This layer is implemented through the use of devices such as switches and bridge devices, as well as anything with a network interface, like wireless or wired network cards Physical Layer-1 - correct answer This layer is responsible for the physical connections of the devices in the network. This layer is implemented through the use of devices such as hubs, repeaters, modem devices, and physical cabling PAN - correct answer a network that is centered around a person and their devices LAN - correct answer consists of computers connected within a limited area WLAN - correct answer a LAN with wireless connectivity SAN - correct answer a network that allows access to storage devices specifically instead of the more general networking that can be used for any purpose CAN - correct answer provides networking of multiple LANs across a limited area, like a university campus or a group of buildings owned by a company MAN - correct answer provides networking across a larger area than a CAN, but smaller than a WAN, such as a whole city or the equivalent of a metropolitan area WAN - correct answer t it covers a large geographical area within its network. This would be the case for worldwide businesses or government bodies Private cloud - correct answer Owned privately Full responsibility to repair and maintain Public cloud - correct answer Owned privately Full responsibility to repair and maintain Community cloud - correct answer Data structure sometimes used in government agencies and universities Hybrid Cloud - correct answer -Company uses combination of private and public cloud -Sometimes used for burst demand (seasonal) -Connection can be VPN or WAN Multi-cloud - correct answer -Using multiple public cloud providers -Can add redundancy and flexibility -Company can use services from one company, but cheaper cloud services from another (ex. Data warehousing) Type 1 hypervisor - correct answer -"bare-metal" -runs directly on the physical hardware of the host machine -loaded directly on the hardware to abstract the hardware to the virtualization layer and is commonly used on servers Type 2 hypervisor - correct answer -installed as an application within another operating system environment -commonly used on personal computers. IaaS (Infrastructure as a Service) - correct answer -Consumer given access to portal -Provider allows you to choose amount of Ram, storage, and network cards -Cloud Provider typically has little to no interaction with virtual machines -You are responsible to protect VM's from disaster and data loss Paas (Platform as a service) - correct answer -Partially managed services -Webhosting is an example -Server is maintain for you -Attractive to devs because it allows them to deploy cod to an application runtime environment Saas (Software as a service) - correct answer -Could represent anything you consume over the internet -Examples: Facebook, Office 365, Salesforce Advanced persistent threats - correct answer -Virus or malware stay undetected till triggered by hacker or time -Will add itself to as many backups as possible Zero-day - correct answer -Day one virus -Dangerous because it is unknown Red Team - correct answer Team that attempts to compromise the security Blue Team - correct answer Team that defends Purple Team - correct answer the red and blue team engage, and then when certain success criteria are met, the teams debrief, cross-train each other, and repeat Insider Threats - correct answer -Come from inside the organization -Can be disgruntled employee, but is sometimes accidental Nation States - correct answer Industrial espionage Script Kiddies - correct answer -Hack out of curiosity -New found skills -Lack of knowledge and unpredictability of attacks -Don't always realize consequences of their actions Wiretapping - correct answer any process that allows an attacker to electronically eavesdrop on a conversation, whether between two humans or two computers (packet snffer) Port Scanning - correct answer -Process of systematically scanning thousands of ports to gain access (TCP port) -Sends thousands of TCP/IP packets to different ports on victims PC to find a response Buffer overflow - correct answer when too many characters are added in a region of memory and can trick the CPU into allowing access Solution to Buffer overflow - correct answer -One protection is to review source code and verify user input fields -Second is enable NX-bit (no-execute) functionality on pc Spoofing - correct answer convinces system it is communicating with a known trusted entity. Gives attacker access to system. Denial-of-service - correct answer prevent legitimate users from accessing the resource by sending an overwhelming amount of data to the target server Ping of Death - correct answer a trick whereby the attacker would send the victim a malformed ICMP packet that would cause the victim's computer to crash or stop functioning on the network. Ping flood - correct answer overwhelms a victim's computer with an immense volume of ICMP echo-request packets, all containing a forged, randomized source address. Smurf - correct answer IP spoofing attacks ICMP, causes to ping indefinitely. Social engineering (hack a human) - correct answer the art of manipulating human trust to gain access or information Phishing - correct answer Emails appear to be from trusted source. Spear phishing is more personal and relevant. Vulnerabilities - correct answer -Poor security measures

Meer zien Lees minder
Instelling
WGU C172
Vak
WGU C172









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
WGU C172
Vak
WGU C172

Documentinformatie

Geüpload op
3 mei 2024
Aantal pagina's
13
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€11,62
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kan je een ander document kiezen. Je kan het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
rickysparkyy

Maak kennis met de verkoper

Seller avatar
rickysparkyy Havard School
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2
Lid sinds
2 jaar
Aantal volgers
0
Documenten
843
Laatst verkocht
1 maand geleden
Ricky sparky

Ace Your Exams with Our Comprehensive Exam Documents and Answers! Struggling with exam preparation? Look no further! Our expertly crafted exam documents come complete with accurate answers, helping you study efficiently and effectively. Each document is designed to cover key topics, provide clear explanations, and offer insightful answers to typical exam questions. Perfect for students aiming to excel, our materials are regularly updated to align with the latest curriculum standards. **Why Choose Us?** - Accurate and Reliable: Verified answers you can trust. - Comprehensive Coverage: Detailed documents covering all major topics. - Time-Saving: Study smarter, not harder. - User-Friendly Format: Easy to navigate and understand. Achieve academic success with our top-notch study aids. Get started today and ace your exams with confidence! Feel free to modify it to better fit your specific offerings!

Lees meer Lees minder
0,0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen