Package deal
WGU C172 Network and Security - Foundations Exam Package Deal Graded A+
WGU C172 Network and Security - Foundations Exam Package Deal Graded A+
[Show more]WGU C172 Network and Security - Foundations Exam Package Deal Graded A+
[Show more]It is a network of users that share computer resources in a limited area. - LAN 
Local Area Network - LAN 
How are Local Area Networks defined? - In terms of protocol and the topology used for accessing 
the network. 
A set of rules established for users to exchange information - Protocol 
The netwo...
Preview 3 out of 21 pages
Add to cartIt is a network of users that share computer resources in a limited area. - LAN 
Local Area Network - LAN 
How are Local Area Networks defined? - In terms of protocol and the topology used for accessing 
the network. 
A set of rules established for users to exchange information - Protocol 
The netwo...
protocol - The set of rules established for users to exchange information 
topology - The network architecture used to interconnect the networking equipment 
deterministic network - Each station connected to the network is ensured access for transmission 
of its messages at regular or fixed time int...
Preview 3 out of 24 pages
Add to cartprotocol - The set of rules established for users to exchange information 
topology - The network architecture used to interconnect the networking equipment 
deterministic network - Each station connected to the network is ensured access for transmission 
of its messages at regular or fixed time int...
Firewall - A part of a computer system or network designed to block unauthorized access while 
permitting outward communication. 
Stateful Inspection Firewall - The inbound and outbound data packets are compared to determine 
if a connection should be allowed. 
Proxy Server - The client gets access ...
Preview 1 out of 4 pages
Add to cartFirewall - A part of a computer system or network designed to block unauthorized access while 
permitting outward communication. 
Stateful Inspection Firewall - The inbound and outbound data packets are compared to determine 
if a connection should be allowed. 
Proxy Server - The client gets access ...
802.11a/Wireless-A - wireless 5GHz - 54Mbps - *75ft* 
802.11b/Wireless-B - wireless 2.4GHz - *11Mbps* - 100-150ft 
802.11g/Wireless-G - 2.4GHz - *54Mbps - 150ft* 
802.11ac/Wireless-AC - 5GHz - *1.3Gbps* 
802.11n/Wireless-N - 2.4GHz - *200+Mbps* 
2.4GHz - Frequency ranges of 802.11G/802.11B 
5GHz - F...
Preview 2 out of 5 pages
Add to cart802.11a/Wireless-A - wireless 5GHz - 54Mbps - *75ft* 
802.11b/Wireless-B - wireless 2.4GHz - *11Mbps* - 100-150ft 
802.11g/Wireless-G - 2.4GHz - *54Mbps - 150ft* 
802.11ac/Wireless-AC - 5GHz - *1.3Gbps* 
802.11n/Wireless-N - 2.4GHz - *200+Mbps* 
2.4GHz - Frequency ranges of 802.11G/802.11B 
5GHz - F...
Application Layer - Interacts with application programs that incorporate a communication 
component such as your internet browser and email. 
Bus Topology - The computers share the media (coaxial cable) for data transmission. 
Cable Modem - A modem that can use the high bandwidth of a cable televisi...
Preview 4 out of 60 pages
Add to cartApplication Layer - Interacts with application programs that incorporate a communication 
component such as your internet browser and email. 
Bus Topology - The computers share the media (coaxial cable) for data transmission. 
Cable Modem - A modem that can use the high bandwidth of a cable televisi...
Site surveys obtain the following information. (Choose all that apply.) 
Electrical power 
Supported bandwidth 
Connection points to the main network. 
RF coverage - Electrical power 
Supported bandwidth 
Connection points to the main network. 
RF coverage 
MIMO uses wave division multiplexing. 
Fal...
Preview 4 out of 33 pages
Add to cartSite surveys obtain the following information. (Choose all that apply.) 
Electrical power 
Supported bandwidth 
Connection points to the main network. 
RF coverage - Electrical power 
Supported bandwidth 
Connection points to the main network. 
RF coverage 
MIMO uses wave division multiplexing. 
Fal...
PING - is one of the most basic tools for testing connectivity to other hosts. It sends an internet 
control message protocol (ICMP) echo request to a host and listens for the reply 
Traceroute/tracert - are used to trace the route an IP packet takes to a destination. It displays 
each hop (next rou...
Preview 1 out of 3 pages
Add to cartPING - is one of the most basic tools for testing connectivity to other hosts. It sends an internet 
control message protocol (ICMP) echo request to a host and listens for the reply 
Traceroute/tracert - are used to trace the route an IP packet takes to a destination. It displays 
each hop (next rou...
A very popular intrusion approach thanks to its success rate is what? - Social Engineering 
The physical architecture of a computer network is known as its ____. - Topologies 
The 802.11 wireless LAN uses what in order to identify the wireless traffic that is permitted to connect? - 
SSID 
PING uses...
Preview 2 out of 6 pages
Add to cartA very popular intrusion approach thanks to its success rate is what? - Social Engineering 
The physical architecture of a computer network is known as its ____. - Topologies 
The 802.11 wireless LAN uses what in order to identify the wireless traffic that is permitted to connect? - 
SSID 
PING uses...
Application Layer(7th layer) - Interacts with application programs that incorporate a 
communication component such as your internet browser and email (provides user interface) 
Bus Topology - The computers share the media (coaxial cable) for data transmission 
CAT6 (category 6) - Twisted-pair cable...
Preview 4 out of 34 pages
Add to cartApplication Layer(7th layer) - Interacts with application programs that incorporate a 
communication component such as your internet browser and email (provides user interface) 
Bus Topology - The computers share the media (coaxial cable) for data transmission 
CAT6 (category 6) - Twisted-pair cable...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller PatrickKaylian. Stuvia facilitates payment to the seller.
No, you only buy these notes for $16.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
79223 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now