Package deal
WGU C172 EXAM PACKAGE DEAL GRADED A+
WGU C172 EXAM PACKAGE DEAL GRADED A+
[Show more]WGU C172 EXAM PACKAGE DEAL GRADED A+
[Show more]Application Layer - Interacts with application programs that incorporate a communication 
component such as your internet browser and email. 
Bus Topology - The computers share the media (coaxial cable) for data transmission. 
Cable Modem - A modem that can use the high bandwidth of a cable televisi...
Preview 4 out of 60 pages
Add to cartApplication Layer - Interacts with application programs that incorporate a communication 
component such as your internet browser and email. 
Bus Topology - The computers share the media (coaxial cable) for data transmission. 
Cable Modem - A modem that can use the high bandwidth of a cable televisi...
Occupational Safety and Health Act - OSH Act 
Occupational Safety and Health Administration - OSHA 
National Fire Protection Association - NFPA; 
creates standards and codes to help form safe environments and prevent accidents 
Code of Federal Regulations - CFR 
Emergency action plan - EAP 
Fire pre...
Preview 4 out of 42 pages
Add to cartOccupational Safety and Health Act - OSH Act 
Occupational Safety and Health Administration - OSHA 
National Fire Protection Association - NFPA; 
creates standards and codes to help form safe environments and prevent accidents 
Code of Federal Regulations - CFR 
Emergency action plan - EAP 
Fire pre...
Application Layer - HTTP and FTP are used as protocols 
Presentation Layer - Data conversion utilities. Protocol 
Conversion, data translation. 
Presentation Layer - Data encryption/decryption is done here. 
Presentation Layer - The layer that handles character encoding. 
Session Layer - Network Ope...
Preview 2 out of 7 pages
Add to cartApplication Layer - HTTP and FTP are used as protocols 
Presentation Layer - Data conversion utilities. Protocol 
Conversion, data translation. 
Presentation Layer - Data encryption/decryption is done here. 
Presentation Layer - The layer that handles character encoding. 
Session Layer - Network Ope...
ocial Engineering - A way for an intruder to obtain enough information from people to gain 
access to the network. 
Password Cracking - The attacker tries to guess the user's password. 
Dictionary Attack - Uses known passwords and variations (lower and uppercase letters) 
Brute Force Attack - Uses ...
Preview 2 out of 8 pages
Add to cartocial Engineering - A way for an intruder to obtain enough information from people to gain 
access to the network. 
Password Cracking - The attacker tries to guess the user's password. 
Dictionary Attack - Uses known passwords and variations (lower and uppercase letters) 
Brute Force Attack - Uses ...
penetration testers - This InfoSec job is tasked with attempting to compromise a network's 
security. 
Insider Threats - Some of the most potent threats come from people within your organization. 
Because they have legitimate access to systems, they are in a position to hack from the inside of the ...
Preview 2 out of 6 pages
Add to cartpenetration testers - This InfoSec job is tasked with attempting to compromise a network's 
security. 
Insider Threats - Some of the most potent threats come from people within your organization. 
Because they have legitimate access to systems, they are in a position to hack from the inside of the ...
Fiber Optic Cable - uses light instead of electricity 
Fiber Optic Cable - can go longer distances and faster 
Fiber Optic Cable - more durable and secure 
Coaxial cable - mostly used by cable TV companies to connect their customers to the company's 
facilities. 
Fiber Optic Cable - similar to tran...
Preview 1 out of 2 pages
Add to cartFiber Optic Cable - uses light instead of electricity 
Fiber Optic Cable - can go longer distances and faster 
Fiber Optic Cable - more durable and secure 
Coaxial cable - mostly used by cable TV companies to connect their customers to the company's 
facilities. 
Fiber Optic Cable - similar to tran...
802.11a/Wireless-A - wireless 5GHz - 54Mbps - *75ft* 
802.11b/Wireless-B - wireless 2.4GHz - *11Mbps* - 100-150ft 
802.11g/Wireless-G - 2.4GHz - *54Mbps - 150ft* 
802.11ac/Wireless-AC - 5GHz - *1.3Gbps* 
802.11n/Wireless-N - 2.4GHz - *200+Mbps* 
2.4GHz - Frequency ranges of 802.11G/802.11B 
5GHz - F...
Preview 2 out of 5 pages
Add to cart802.11a/Wireless-A - wireless 5GHz - 54Mbps - *75ft* 
802.11b/Wireless-B - wireless 2.4GHz - *11Mbps* - 100-150ft 
802.11g/Wireless-G - 2.4GHz - *54Mbps - 150ft* 
802.11ac/Wireless-AC - 5GHz - *1.3Gbps* 
802.11n/Wireless-N - 2.4GHz - *200+Mbps* 
2.4GHz - Frequency ranges of 802.11G/802.11B 
5GHz - F...
Firewall - A part of a computer system or network designed to block unauthorized access while 
permitting outward communication. 
Stateful Inspection Firewall - The inbound and outbound data packets are compared to determine 
if a connection should be allowed. 
Proxy Server - The client gets access ...
Preview 1 out of 4 pages
Add to cartFirewall - A part of a computer system or network designed to block unauthorized access while 
permitting outward communication. 
Stateful Inspection Firewall - The inbound and outbound data packets are compared to determine 
if a connection should be allowed. 
Proxy Server - The client gets access ...
Site surveys obtain the following information. (Choose all that apply.) 
Electrical power 
Supported bandwidth 
Connection points to the main network. 
RF coverage - ans Electrical power 
Supported bandwidth 
Connection points to the main network. 
RF coverage 
MIMO uses wave division multiplexing. ...
Preview 4 out of 33 pages
Add to cartSite surveys obtain the following information. (Choose all that apply.) 
Electrical power 
Supported bandwidth 
Connection points to the main network. 
RF coverage - ans Electrical power 
Supported bandwidth 
Connection points to the main network. 
RF coverage 
MIMO uses wave division multiplexing. ...
PING - is one of the most basic tools for testing connectivity to other hosts. It sends an internet 
control message protocol (ICMP) echo request to a host and listens for the reply 
Traceroute/tracert - are used to trace the route an IP packet takes to a destination. It displays 
each hop (next rou...
Preview 1 out of 3 pages
Add to cartPING - is one of the most basic tools for testing connectivity to other hosts. It sends an internet 
control message protocol (ICMP) echo request to a host and listens for the reply 
Traceroute/tracert - are used to trace the route an IP packet takes to a destination. It displays 
each hop (next rou...
protocol - The set of rules established for users to exchange information 
topology - The network architecture used to interconnect the networking equipment 
deterministic network - Each station connected to the network is ensured access for transmission 
of its messages at regular or fixed time int...
Preview 3 out of 24 pages
Add to cartprotocol - The set of rules established for users to exchange information 
topology - The network architecture used to interconnect the networking equipment 
deterministic network - Each station connected to the network is ensured access for transmission 
of its messages at regular or fixed time int...
It is a network of users that share computer resources in a limited area. - LAN 
Local Area Network - LAN 
How are Local Area Networks defined? - In terms of protocol and the topology used for accessing 
the network. 
A set of rules established for users to exchange information - Protocol 
The netwo...
Preview 3 out of 21 pages
Add to cartIt is a network of users that share computer resources in a limited area. - LAN 
Local Area Network - LAN 
How are Local Area Networks defined? - In terms of protocol and the topology used for accessing 
the network. 
A set of rules established for users to exchange information - Protocol 
The netwo...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller PatrickKaylian. Stuvia facilitates payment to the seller.
No, you only buy these notes for $22.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
76799 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now