WGU D315 Network and Security Exam 181 Questions with
Verified Answers
Which type of Ethernet cable can maintain 10Gbps transmission speeds through
the course of its maximum 100-meter length? - CORRECT ANSWER CAT 6a
Which Internet access technology uses ordinary telephone wires for data
transmission? - CORRECT ANSWER DSL
Which device is used to organize network cables as they run between switches
and other network devices? - CORRECT ANSWER Patch panel
Which network device is used to connect two or more network segments by
performing OSI layer 3 functions like packet-forwarding? - CORRECT ANSWER
Router
Which network device is used to convert between digital information from a LAN
and analog signals for transmission over a standard telephone wire? - CORRECT
ANSWER Modem
Which device could be used to send commands to the mainframe for remote
execution in early mainframe installations? - CORRECT ANSWER Dumb terminals
Which device is responsible for implementing network address translation (NAT)?
- CORRECT ANSWER Router
Which OSI layer is related to the function of the IP protocol suite? - CORRECT
ANSWER Network
Which OSI layer is responsible for organizing how bits are passed over the
physical layer between devices within the same collision domain? - CORRECT
ANSWER Data Link
,Which OSI layer would define the scope of a protocol that makes sure packets of
data are received correctly and resends them if they are not? - CORRECT ANSWER
Transport
Which protocol suite performs functions of OSI layer 4? - CORRECT ANSWER TCP
Which command produces the following output?Non-authoritative answer:Name:
www.google.comAddress: 172.217.11.132 - CORRECT ANSWER nslookup
Which command should be used to manually enter the default gateway for a
computer? - CORRECT ANSWER route
Which network diagnostic tool displays the path packets take between two
endpoints? - CORRECT ANSWER traceroute
Which network type is used to wire multiple PCs to a home router? - CORRECT
ANSWER LAN
An office's infrastructure connects network devices and printers through a central
access point without the use of cabling. Which network type does this office use?
- CORRECT ANSWER WLAN
What type of medium is commonly used within a 1000 Mbps Ethernet network? -
CORRECT ANSWER CAT5e
Which network topology is shown in the following diagram? - CORRECT ANSWER
Full mesh
Which network topology is being implemented when each node connects to
exactly two other nodes, forming a single continuous pathway for signals through
each node? - CORRECT ANSWER Ring
In which physical LAN topology are nodes connected to each other with a
backbone cable that loops around and ends at the same point it started? -
CORRECT ANSWER Ring
, Which cloud service provides hardware, operating systems, and web servers but
not end-user applications? - CORRECT ANSWER PaaS (Platform as a Service)
Which cloud model provides an exclusive cloud computing service environment
that is shared between two or more organizations? - CORRECT ANSWER
Community
Which type of software is used to provide virtualization? - CORRECT ANSWER
Hypervisor
Which OSI layer ensures error-free packets? - CORRECT ANSWER Transport
Which topology uses a switch or hub to connect to all devices in the same
network? - CORRECT ANSWER Star
A user that does not want to be identified while communicating on a network
uses an application to alter the computer€™s identity. Which type of exploit is
being perpetrated? - CORRECT ANSWER Spoofing
An attacker attempts to misdirect traffic on a network back to the attacker by
corrupting the network computer€™s cache of IP address to MAC address
mappings that are cached. Which exploit is the attacker perpetrating? - CORRECT
ANSWER ARP poisoning
Which exploit actually breaches the physical medium or uses devices to monitor
signals from outside the physical medium itself? - CORRECT ANSWER Wiretapping
Which type of attack can overwhelm a web server by inserting more data into a
web form than the system was configured to hold? - CORRECT ANSWER Buffer
overflow
Which type of attack sends an email claiming to be from a reputable business in
order to entice the recipient to provide sensitive information? - CORRECT
ANSWER Phishing
A user on a network is planning to launch an exploit against a coworker in a
neighboring department. The user needs to identify the IP address of a coworker
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller paulhans. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $16.49. You're not tied to anything after your purchase.