WGU D075 OA (2024/2025) EXAM
QUESTIONS WITH CORRECT DETAILED
ANSWERS || ALREADY GRADED A+
<LATEST VERSION>
What is a Physical cable system? - ANSWER ✔ The most commonly used
network cable is an Ethernet cable. Ethernet network cables are specialized wires
with adapters that plug into the NIC, and the most common type of cable wire is
called a twisted pair. A twisted pair is a specialized wire that cancels out
electromagnetic interference from other electronic devices and increases reliability.
What is a hub? - ANSWER ✔ the most common hub is an Ethernet hub. The hub
is a central location of the computer network that serves as a traffic cop for
network connection and communication. Hubs ensure that computer traffic
collisions are eliminated. Cables from network computers and other devices are
plugged into a hub.
What is A computer network? - ANSWER ✔ A computer network is defined as
two or more computers connected together to communicate and share resources.
The shared resources may refer to computer files, folders, software, and peripheral
hardware like printers, scanners, and webcams.
What is Topology? - ANSWER ✔ Topology is the mapping of a physical network
and logical interconnections between nodes. It is the way a network is arranged
and laid out. A node is any device that is connected as part of a computer network,
including computers, hubs, printers, and switches.
, What is a bus topology (linear bus) - ANSWER ✔ Network topology where each
of a network's nodes is connected to a common linear backbone that has two
endpoints. Data are transmitted between the two endpoints and the nodes are
connected to the backbone. One advantage of a bus topology is that all nodes can
receive data virtually simultaneously. A disadvantage is that if the backbone is
down, all nodes on the backbone are down as well.
What is a Star topology? - ANSWER ✔ Star topologies are the most common of
all topologies. A star topology includes nodes that radiate around a central node in
a spoke-like fashion. The center of the star is the hub that attaches to the nodes
with spokes. If the central hub fails, every node attached to the hub will also fail.
What is a ring topology? - ANSWER ✔ A ring topology is shaped like a ring.
Each computer (node) is connected to two other computers in the network with the
first and last computers being connected to each other. Data are transmitted
between computers in a circular manner. Least used topology with
microcomputers. In a ring topology, if the traffic cannot flow in one direction, then
it can try to flow in the other direction around the ring. This makes it more robust
because there is no hub through which all the traffic flows.
What is The Internet? - ANSWER ✔ The internet is the world's largest network
and connects thousands of other networks together including LANs, CANs,
MANs, and WANs. The interconnection of public, private, commercial, industrial,
and governmental networks is called the internet.
A local area network (LAN) - ANSWER ✔ A computer network that is relatively
small, typically in a single building, but sometimes as small as a single room.
LANs can serve smaller businesses and often serve smaller parts of a large
business, like an accounting department or sales division.
,What is a firewall? - ANSWER ✔ A firewall is a combination of specialized
hardware and software that ensures that only authorized personnel can access and
use an organization's intranet.
A campus area network (CAN) - ANSWER ✔ A computer network that connects
two or more LANs that are located on a campus, like a university, an organization's
national headquarters, or even an industrial complex. For example, a CAN may
connect an English department's LAN to a math department's LAN, thereby
allowing them to share resources. Additionally, a business campus would be able
to connect the accounting department's LAN with the human resources LAN. A
CAN is typically limited in size to the specific size of the campus it serves.
What is the InTRAnet? - ANSWER ✔ An intranet is a like a private version of the
internet that works the same way, but it is confined within an organization.
Intranets contain company policies, computer files, and a host of other business
resources.
A metropolitan area network (MAN) - ANSWER ✔ A computer network that
connects two or more LANs or CANs together but within the boundaries of a town
or city. An example of a MAN might be a bank with different branch locations
throughout a metropolitan area that are all connected.
What is a worm? - ANSWER ✔ A computer worm is a virus in that it is self-
replicating and does not need to attach itself to an existing program to spread.
Worms use networks to travel by sending copies of themselves to other parts of the
network without a user's knowledge or intervention. A worm can slow a system's
performance, erase files, and damage physical hardware.
Wide area networks (WAN) - ANSWER ✔ Computer networks that encompass a
wide geographical area and connect LANs, CANs, and MANs together. Often,
WANs rely on a telephone company's transmission facilities to connect the smaller
, networks together. Many large organizations rely on WANs to centralize data and
information in a main office and then have the capability to disseminate that
information nationwide, or even worldwide. For example, airlines rely on WANs
to provide ticketing agents with access to all flight information. The airline is an
example of a network with agents connected using what are referred to as "dumb"
terminals. A dumb terminal can be best defined as a computer whose sole purpose
is to connect to the network and nothing else.
What is a Trojan horse? - ANSWER ✔ a Trojan horse is a program that seems
harmless and possibly interesting at first until it is executed. When the program is
executed, it may release one or many harmful viruses, worms, or any other sort of
malicious programs. A particular computer action or even a particular date can
initiate them.
What is spyware? - ANSWER ✔ Spyware is a program that is installed covertly
on a computer to capture or take control of the system without the user's
knowledge or consent. Monitors a user's keystrokes and behavior, but can also
install new software that can include more spyware or programming to divert a
computer to third party advertising websites.
What is a denial-of-service (DoS)? - ANSWER ✔ An attempt to make a computer
or any of its resources unavailable to its intended users. eg) email attachment that
runs constantly and requires an enormous amount of processing power of the
computer. The computer slows down or stops running altogether. DoS attacks
often target something as large as an entire network or simply deny use of a
website or software.
What is Keylogging? - ANSWER ✔ Perpetrator logs on to a computer
workstation and installs a program that simply records every keystroke made at the
workstation's keyboard. The computer criminal waits for a legitimate user to sign
in, and then the keylogging software records the login ID, password, and any other
sensitive information.