100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D481 - SECTION 2 OA PREP QUESTIONS WITH COMPLETE SOLUTIONS VERIFIED $9.99   Add to cart

Exam (elaborations)

WGU D481 - SECTION 2 OA PREP QUESTIONS WITH COMPLETE SOLUTIONS VERIFIED

 15 views  0 purchase
  • Course
  • Institution

WGU D481 - SECTION 2 OA PREP QUESTIONS WITH COMPLETE SOLUTIONS VERIFIED Circuit-switched Creates a path between source and destination devices Extranet Private network for authorized external users to share information Internet Protocol (IP) Delivers packets across networks by handling rout...

[Show more]

Preview 3 out of 23  pages

  • May 1, 2024
  • 23
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
WGU D481 - SECTION 2 OA PREP QUESTIONS WITH
COMPLETE SOLUTIONS VERIFIED

Circuit-switched
Creates a path between source and destination devices
Extranet
Private network for authorized external users to share information
Internet Protocol (IP)
Delivers packets across networks by handling routing decisions
Internet Protocol (IP) Suite
Another name for the TCP/IP suite
Internetworking
Connecting multiple computer networks
Intranet
Private, internal network
Logical Topology
Shows how devices connect to a specific segment of the network
Network Topology
Map of a network and how devices are connected
Open Systems Interconnection (OSI) Reference Model
Framework of standards for computer system communication
Packet-switched
Networks that transmit packets as individual messages
Physical Topology
Physical network devices and devices used to connect
Point-to-point Network
Network consisting only of directly connected computers and devices
Transmission Control Protocol (TCP)

,Guarantees reliable data stream between two computers
Transmission Control Protocol/Internet Protocol (TCP/IP) Reference Model
Descriptive framework for computer network protocols
Transmission Control Protocol/Internet Protocol (TCP/IP) Suite
Collection that provides support to internet-capable systems and devices
Data Link Layer
Second layer of the OSI model, also called Layer 2
Bridges
Network devices that interconnect two or more LANs
Ethernet
Wired system for connecting devices in local area networks
Hub
Hardware device that connects multiple networking devices
IEEE 802.3 Standards
Ethernet standards and protocols established by IEEE
IEEE 802.3 CSMA/CD Standards
Standard specifications for Ethernet
Physical Layer
First layer of the OSI model, also called Layer 1
Protocol
Established set of rules for data transmission across devices
Redundancy
Providing alternate means for network to continue functioning
Repeater
Device that receives and amplifies a signal
Resilience
Ability to continue providing acceptable service despite challenges
Structured Wiring System
Modular cable solution that is flexible
Switches
Networking equipment that allows multiple devices to communicate

, Connection-oriented Protocol
Sets up a connection between source and destination
Connectionless Protocol
Treats each connection individually
Datagram
Packets transmitted across networks
Internet Assigned Numbers Authority (IANA)
Organization overseeing IP address allocations
Network Address Translation (NAT)
Maps local private addresses to public ones
ARPANET
Computer network developed by the Department of Defense
Layer 2 Tunneling Protocol (L2TP)
Protocol supporting virtual private networks (VPNs)
Web Browser
Protocol to link all resources together
SMTP
Simple Mail Transfer Protocol (SMTP) is a TCP service that operates on port 25 and is
used for the exchange of electronic mail between networked systems.
Spoofing
Spoofing is a vulnerability associated with SMTP where an attacker impersonates a
trusted entity to gain unauthorized access.
Spamming
Spamming is a vulnerability associated with SMTP where an attacker sends unsolicited
bulk emails.
TFTP
Trivial File Transfer Protocol (TFTP) operates on UDP port 69 and is used to transfer
router configuration files and configure cable modems.
Authentication
Authentication is the process of verifying the identity of a user or system before granting
access to resources.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller NurseAdvocate. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

81989 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.99
  • (0)
  Add to cart