100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C172 Network and Security Practice Study Guide Questions with Distinction level Marking scheme version 2024/2025 $11.49   Add to cart

Exam (elaborations)

WGU C172 Network and Security Practice Study Guide Questions with Distinction level Marking scheme version 2024/2025

 1 view  0 purchase
  • Course
  • WGU C172 Network & Security
  • Institution
  • WGU C172 Network & Security

WGU C172 Network and Security Practice Study Guide Questions with Distinction level Marking scheme version 2024/2025 What encryption algorithm uses the same pre-shared key to encrypt and decrypt data? - correct answer Symmetric Which of the following describes a private cloud? - correct answe...

[Show more]

Preview 3 out of 17  pages

  • November 2, 2024
  • 17
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU C172 Network & Security
  • WGU C172 Network & Security
avatar-seller
KieranKent55
WGU C172 Network and Security Practice
Study Guide Questions with Distinction level
Marking scheme version 2024/2025

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data? -
correct answer Symmetric


Which of the following describes a private cloud? - correct answer Provides cloud
services to a single organization


You have a small network that uses a switch to connect multiple devices. Which
physical topology are you using? - correct answer Star


Which of the following topologies connects each device to a neighboring device? -
correct answer Ring


Cynthia is working on her Western Governors University application online, when the
admissions website crashes. She is unable to turn in her application on time. What part
of the CIA Triad is affected? - correct answer Availability


What are two ways to protect a computer from malware? (Choose two) - correct
answer Use antivirus software and keep software up to date


Your company purchases a new bridge that filters packets based on the MAC address
of the destination computer. On which layer of the OSI model is this device functioning?
- correct answer Data Link


Which of the following describes a public cloud? - correct answer Provides cloud
services to just about anyone


Which of the following are examples of social engineering? (Choose two) - correct
answer Impersonation and Phishing

,Brian would like to secure his website. Which one of the following protocols is the best
choice for encrypting communication between a website and its users? - correct
answer TLS


Your manager has asked you to implement a wired network infrastructure that will
accommodate failed connections. Which of the following network topologies should you
implement? - correct answer Mesh


Which layer of the OSI model is responsible for the establishment, maintaining and
terminating the connection between two systems? - correct answer Session


A switch forwards data only to the port that are connected to the destination device. It
knows which port to forward it to based on which value? - correct answer MAC
Address


Which of the following wireless security protocols has been discouraged in favor of
newer standards due to known vulnerabilities resulting from implementation flaws? -
correct answer WEP


In a private cloud companies such as Amazon Web Services, Microsoft Azure, and
Google Cloud Platforms are responsible for the physical data center security concerns. -
correct answer False


Kim has taken her Network and Security Foundation exam and is waiting to get her
results by email. By accident, Kim's results are sent to Karen. What part of the CIA Triad
is affected? - correct answer Confidentiality


Amazon Web Services, Microsoft Azure, and Google Cloud Platform are responsible for
the physical data center security and most the physical hardware security concerns in
which cloud deployment? - correct answer Public Cloud


Which of the following topologies connects all devices to a single cable? - correct
answer Bus

, Which of the following hardware devices forwards a signal out all connected ports
without examining the frame or packet contents? - correct answer Hub


Starting at layer 1 and going to layer 7 what are the layers of the OSI model: - correct
answer physical, data link, network, transport, session, presentation, application


Which one of the following wireless encryption protocols is considered the weakest and
recommended to no longer use? - correct answer WEP


Bob receives a message from Alice that she sent using an asymmetric cryptography
algorithm. What key should he use to decrypt the message? - correct answer Bob's
private key


Which of the following would provide the most effective security for a small wireless
network? - correct answer WPA2


What does tracert do? - correct answer Determine the route a packet takes to a
destination
- takes advantage of ICMP time to live exceeded error message


Which of the following strategies involves sharing some of the risk burden with someone
else, such as an insurance company? - correct answer Risk transferrence
Nslookup - correct answer Used to determine IP address of a domain name.


Ping - correct answer Used to determine the IP address and latency in networks.


Netstat -a - correct answer Used to display IP ports currently open on the Windows
OS.


Whois - correct answer Information about a webserver including contact information.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller KieranKent55. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

83637 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.49
  • (0)
  Add to cart