Package deal
WGU C172 Bundled Exams with Complete Solution | Verified | Everything you Need!!
WGU C172 Bundled Exams with Complete Solution | Verified | Everything you Need!!
[Show more]WGU C172 Bundled Exams with Complete Solution | Verified | Everything you Need!!
[Show more]Which OSI layer is related to the function of the IP protocol suite? 
Network 
Which OSI layer is responsible for organizing how bits are passed over the physical layer between devices 
within the same collision domain? 
Data link 
Which OSI layer would define the scope of a protocol that makes sure...
Preview 2 out of 7 pages
Add to cartWhich OSI layer is related to the function of the IP protocol suite? 
Network 
Which OSI layer is responsible for organizing how bits are passed over the physical layer between devices 
within the same collision domain? 
Data link 
Which OSI layer would define the scope of a protocol that makes sure...
Two or more computers connected together over a wide geographical area (e.g. county, country, globe). 
What type of network is this? - -WAN 
Which of the following cloud computing solutions will deliver software applications to a client either 
over the internet or on a local area network? - -SaaS 
...
Preview 2 out of 6 pages
Add to cartTwo or more computers connected together over a wide geographical area (e.g. county, country, globe). 
What type of network is this? - -WAN 
Which of the following cloud computing solutions will deliver software applications to a client either 
over the internet or on a local area network? - -SaaS 
...
802.11a/Wireless-A - -wireless 5GHz - 54Mbps - *75ft* 
802.11b/Wireless-B - -wireless 2.4GHz - *11Mbps* - 100-150ft 
802.11g/Wireless-G - -2.4GHz - *54Mbps - 150ft* 
802.11ac/Wireless-AC - -5GHz - *1.3Gbps* 
802.11n/Wireless-N - -2.4GHz - *200+Mbps* 
2.4GHz - -Frequency ranges of 802.11G/802.11B 
5G...
Preview 1 out of 4 pages
Add to cart802.11a/Wireless-A - -wireless 5GHz - 54Mbps - *75ft* 
802.11b/Wireless-B - -wireless 2.4GHz - *11Mbps* - 100-150ft 
802.11g/Wireless-G - -2.4GHz - *54Mbps - 150ft* 
802.11ac/Wireless-AC - -5GHz - *1.3Gbps* 
802.11n/Wireless-N - -2.4GHz - *200+Mbps* 
2.4GHz - -Frequency ranges of 802.11G/802.11B 
5G...
Application Layer - -Interacts with application programs that incorporate a communication 
component such as your internet browser and email. 
Bus Topology - -The computers share the media (coaxial cable) for data transmission. 
Cable Modem - -A modem that can use the high bandwidth of a cable telev...
Preview 4 out of 52 pages
Add to cartApplication Layer - -Interacts with application programs that incorporate a communication 
component such as your internet browser and email. 
Bus Topology - -The computers share the media (coaxial cable) for data transmission. 
Cable Modem - -A modem that can use the high bandwidth of a cable telev...
Which OSI layer is related to the function of the IP protocol suite? - -Network 
Which OSI layer is responsible for organizing how bits are passed over the physical layer between devices 
within the same collision domain? - -Data link 
Which OSI layer would define the scope of a protocol that makes ...
Preview 1 out of 3 pages
Add to cartWhich OSI layer is related to the function of the IP protocol suite? - -Network 
Which OSI layer is responsible for organizing how bits are passed over the physical layer between devices 
within the same collision domain? - -Data link 
Which OSI layer would define the scope of a protocol that makes ...
Site surveys obtain the following information. (Choose all that apply.) 
Electrical power 
Supported bandwidth 
Connection points to the main network. 
RF coverage - -Electrical power 
Supported bandwidth 
Connection points to the main network. 
RF coverage 
MIMO uses wave division multiplexing. 
Fa...
Preview 3 out of 29 pages
Add to cartSite surveys obtain the following information. (Choose all that apply.) 
Electrical power 
Supported bandwidth 
Connection points to the main network. 
RF coverage - -Electrical power 
Supported bandwidth 
Connection points to the main network. 
RF coverage 
MIMO uses wave division multiplexing. 
Fa...
Chp. 7 
What are the two ways 802.11 supports authenticating clients? - -open and shared key 
Chp. 7 
What does RADIUS do? - -RADIUS is used to provide authentication and prevent unauthorized users 
from connecting to the network. 
Chp. 7 
What does RADIUS stand for? - -Remote Authentication Dial-In...
Preview 2 out of 7 pages
Add to cartChp. 7 
What are the two ways 802.11 supports authenticating clients? - -open and shared key 
Chp. 7 
What does RADIUS do? - -RADIUS is used to provide authentication and prevent unauthorized users 
from connecting to the network. 
Chp. 7 
What does RADIUS stand for? - -Remote Authentication Dial-In...
What is an example of a networking attack? 
Having insecure passwords that a hacker runs a dictionary based attack against. 
What is an example of a social engineering attack? 
Receiving an bad email (phishing). Happen because humans don't see it coming. 
What is an APT? 
Advanced Persistent Threat...
Preview 2 out of 6 pages
Add to cartWhat is an example of a networking attack? 
Having insecure passwords that a hacker runs a dictionary based attack against. 
What is an example of a social engineering attack? 
Receiving an bad email (phishing). Happen because humans don't see it coming. 
What is an APT? 
Advanced Persistent Threat...
Social Engineering - -The first issue of intrusion is ____. 
Tunneling - -Which of the following allows a secure communication between a private network and a 
public network, such as the Internet? 
DoS Attack - -Which of the following security attacks occurs when an attacker sends the target 
syste...
Preview 1 out of 2 pages
Add to cartSocial Engineering - -The first issue of intrusion is ____. 
Tunneling - -Which of the following allows a secure communication between a private network and a 
public network, such as the Internet? 
DoS Attack - -Which of the following security attacks occurs when an attacker sends the target 
syste...
Social Engineering - -This is a way for an intruder to gain enough information from people to gain 
access to the network. As an example, an attacker calls a user on a network and claims he is from the 
computer support division of the network. The attacker tells the user that there is a problem wit...
Preview 2 out of 6 pages
Add to cartSocial Engineering - -This is a way for an intruder to gain enough information from people to gain 
access to the network. As an example, an attacker calls a user on a network and claims he is from the 
computer support division of the network. The attacker tells the user that there is a problem wit...
OSI Layer 1 - Physical - -Physical Layer: This layer is responsible for the physical connections of the 
devices in the network. This layer is implemented through the use of devices such as hubs, repeaters, 
modem devices, and physical cabling. 
OSI Layer 2 - Data Link - -Data Link Layer: This layer...
Preview 2 out of 7 pages
Add to cartOSI Layer 1 - Physical - -Physical Layer: This layer is responsible for the physical connections of the 
devices in the network. This layer is implemented through the use of devices such as hubs, repeaters, 
modem devices, and physical cabling. 
OSI Layer 2 - Data Link - -Data Link Layer: This layer...
OSI Model Layer 1 - -Physical 
The Physical layer represents the physical medium that connects the computers together. 
OSI Model Layer 2 - -Data Link 
represents how computers logically connect to the network. Protocols at Layer 2 define how computers 
can share access to a common medium, such as a...
Preview 2 out of 9 pages
Add to cartOSI Model Layer 1 - -Physical 
The Physical layer represents the physical medium that connects the computers together. 
OSI Model Layer 2 - -Data Link 
represents how computers logically connect to the network. Protocols at Layer 2 define how computers 
can share access to a common medium, such as a...
Asset - -A person, device, location, or information that SecOps aims to protect from attack. 
Attack - -An action taken by a threat that exploits a vulnerability that attempts to either block 
authorized access to an asset, or to gain unauthorized access to an asset. 
Risk - -The potential of a thre...
Preview 2 out of 11 pages
Add to cartAsset - -A person, device, location, or information that SecOps aims to protect from attack. 
Attack - -An action taken by a threat that exploits a vulnerability that attempts to either block 
authorized access to an asset, or to gain unauthorized access to an asset. 
Risk - -The potential of a thre...
Which of the following are advantages of optical communication links? - -1. Security 
2. Extremely wide bandwidth 
3. Elimination of crosstalk 
What is the "two deep" rule relative to optical networking? - -This means that a building should only 
have the main distribution and the intermediate dis...
Preview 1 out of 2 pages
Add to cartWhich of the following are advantages of optical communication links? - -1. Security 
2. Extremely wide bandwidth 
3. Elimination of crosstalk 
What is the "two deep" rule relative to optical networking? - -This means that a building should only 
have the main distribution and the intermediate dis...
In TCP/IP model,____layer processes requests from hosts to ensure a connection is made to the 
appropriate port - -application 
The binary value for the decimal number 49 is - - 
Decimal equivalent of is - -37 
Decimal equivalent of is - -170 
Decimal equivalent of is - -240 
Binary equivalent of...
Preview 1 out of 3 pages
Add to cartIn TCP/IP model,____layer processes requests from hosts to ensure a connection is made to the 
appropriate port - -application 
The binary value for the decimal number 49 is - - 
Decimal equivalent of is - -37 
Decimal equivalent of is - -170 
Decimal equivalent of is - -240 
Binary equivalent of...
TCP/IP - -Known as Transmission Control Protocol/internet protocol and is a set of protocols used to 
connect network devices to each other 
Application Layer (TCP/IP) - -TCP/IP layer that is responsible for the communication protocols 
between nodes, such as HTTP, SSH, and NTP 
Transport Layer (TCP...
Preview 2 out of 11 pages
Add to cartTCP/IP - -Known as Transmission Control Protocol/internet protocol and is a set of protocols used to 
connect network devices to each other 
Application Layer (TCP/IP) - -TCP/IP layer that is responsible for the communication protocols 
between nodes, such as HTTP, SSH, and NTP 
Transport Layer (TCP...
A very popular intrusion approach thanks to its success rate is what? - -Social Engineering 
The physical architecture of a computer network is known as its ____. - -Topologies 
The 802.11 wireless LAN uses what in order to identify the wireless traffic that is permitted to connect? - 
-SSID 
PING u...
Preview 2 out of 5 pages
Add to cartA very popular intrusion approach thanks to its success rate is what? - -Social Engineering 
The physical architecture of a computer network is known as its ____. - -Topologies 
The 802.11 wireless LAN uses what in order to identify the wireless traffic that is permitted to connect? - 
-SSID 
PING u...
TCP/IP (Transmission Control Protocol/Internet Protocol) - -A set of protocols made up of four layers 
(Application, Transport, Network, Network Interface Layer) used to connect network devices to each 
other 
Network Interface Layer (TCP/IP) - -TCP/IP model layer that establishes how data should be...
Preview 3 out of 19 pages
Add to cartTCP/IP (Transmission Control Protocol/Internet Protocol) - -A set of protocols made up of four layers 
(Application, Transport, Network, Network Interface Layer) used to connect network devices to each 
other 
Network Interface Layer (TCP/IP) - -TCP/IP model layer that establishes how data should be...
It is a network of users that share computer resources in a limited area. - -LAN 
Local Area Network - -LAN 
How are Local Area Networks defined? - -In terms of protocol and the topology used for accessing 
the network. 
A set of rules established for users to exchange information - -Protocol 
The n...
Preview 4 out of 32 pages
Add to cartIt is a network of users that share computer resources in a limited area. - -LAN 
Local Area Network - -LAN 
How are Local Area Networks defined? - -In terms of protocol and the topology used for accessing 
the network. 
A set of rules established for users to exchange information - -Protocol 
The n...
What is the subnet address for a packet that is sent to 174.118.17.95 with a subnet mask of 
255.255.248.0? - -174.118.16.0 
With an address of 197.15.22.31 and a subnet mask of 255.255.255.224, how many bits have been 
borrowed to create a subnet? - -3 
Which 802.11 technologies use the 2.4Ghz spec...
Preview 1 out of 3 pages
Add to cartWhat is the subnet address for a packet that is sent to 174.118.17.95 with a subnet mask of 
255.255.248.0? - -174.118.16.0 
With an address of 197.15.22.31 and a subnet mask of 255.255.255.224, how many bits have been 
borrowed to create a subnet? - -3 
Which 802.11 technologies use the 2.4Ghz spec...
Firewall - -A part of a computer system or network designed to block unauthorized access while 
permitting outward communication. 
Stateful Inspection Firewall - -The inbound and outbound data packets are compared to determine if 
a connection should be allowed. 
Proxy Server - -The client gets acce...
Preview 1 out of 4 pages
Add to cartFirewall - -A part of a computer system or network designed to block unauthorized access while 
permitting outward communication. 
Stateful Inspection Firewall - -The inbound and outbound data packets are compared to determine if 
a connection should be allowed. 
Proxy Server - -The client gets acce...
Traceroute - -Used to determine the number of hops required for a packet to reach its destination. 
Nslookup - -Used to determine IP address of a domain name. 
Ping - -Used to determine the IP address and latency in networks. 
Netstat -a - -Used to display IP ports currently open on the Windows OS. ...
Preview 1 out of 2 pages
Add to cartTraceroute - -Used to determine the number of hops required for a packet to reach its destination. 
Nslookup - -Used to determine IP address of a domain name. 
Ping - -Used to determine the IP address and latency in networks. 
Netstat -a - -Used to display IP ports currently open on the Windows OS. ...
Application Layer(7th layer) - -Interacts with application programs that incorporate a communication 
component such as your internet browser and email (provides user interface) 
Bus Topology - -The computers share the media (coaxial cable) for data transmission 
CAT6 (category 6) - -Twisted-pair ca...
Preview 3 out of 29 pages
Add to cartApplication Layer(7th layer) - -Interacts with application programs that incorporate a communication 
component such as your internet browser and email (provides user interface) 
Bus Topology - -The computers share the media (coaxial cable) for data transmission 
CAT6 (category 6) - -Twisted-pair ca...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller Preach. Stuvia facilitates payment to the seller.
No, you only buy these notes for $40.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
67866 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now