Network and Security Foundations Practice Test (WGU C172) Study Guide Top-Rated 2024
37 views 1 purchase
Course
(WGU C172)
Institution
(WGU C172)
Two or more computers connected together over a wide geographical area (e.g. county, country, globe). What type of network is this? - WAN
Which of the following cloud computing solutions will deliver software applications to a client either over the internet or on a local area network? - SaaS
...
Network and Security Foundations Practice Test (WGU C172) Study Guide Top-Rated 2024 Two or more computers connected together over a wide geographical area (e.g. county, country, globe). What type of network is this? - WAN Which of the following cloud computing solutions will deliver software applications to a client either over the internet or on a local area network? - SaaS With regards to AAA, ________ defines what the user can access and in what manner. - Authorization What type of attack targets an SQL database using the input field of a user? - SQL injection Which network is this? I allow computers to communicate with each other in the same building - LAN Reports on a user's access and logs of successful and unsuccessful connection attempts are which part of AAA? - Accounting What should we be concerned with keeping up to date? - Office Suites, Browser Plugins, Anti -virus Barry is working with his organization's platforms team to select a virtualization approach for use in their data center. To provide stronger security, he would like to select a hypervisor that runs directly on bare metal hardware without an intervening ho st operating system. What type of hypervisor should he choose? - Type 1 You have implemented a network where each device provides all other devices on the network with access to shared files. What type of network do you have? - Peer -to-Peer Tom would like to determine what network ports are open on a newly commissioned server. Which one of the following tools is best suited for that task? - Nmap Which of the following geographic network types are typically contained within city or county limits? - Metropolitan Area Network (MAN) Which of the following threat actors seeks to defame, shed light on, or cripple an organization or government? - Black Hat Which of the following describes a man -in-the-middle attack? - A false server intercepts communications from a client by impersonating the intended server. Alice would like to send a message to Bob using an asymmetric cryptography algorithm. What key should she use to encrypt the message? - Bob's public key With regards to AAA, _______ confirms that the user is how he or she claims to be. - Authentication Which type of fiber cable is normally used to connect two buildings that are several miles apart? - Single -mode Which of the following are transport layer protocols? - TCP and UDP In what type of attack does the attacker attempt to send unauthorized commands to a back -end database through a web application? - SQL Injection Kyle is concerned that an attacker is probing his network and would like to use a decoy system to attract the attacker and analyze his or her activity. What type of tool would best meet Kyle's needs? - Honeypot In the OSI model, what is the primary function of the Network layer? - Routes data between networks James is working with his organization's platforms team to select a virtualization approach for use on test systems managed by developers. He is looking for a hypervisor that can run on top of the Windows operating system already installed on their laptops . What type of hypervisor is James looking for? - Type 2 You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use? - Circuit -level You were recently hired by a small start -up company. The company has no plans to setup their own datacenter. You have been asked to find a cloud service that would provide several physical servers or virtual machines that the company would be able to insta ll whatever operating systems and applications they need. Which cloud service model should you use? - Iaas A company is concerned with traffic that flows through the network. There is a concern that there may be malware that exists that is not being blocked or eradicated by antivirus. What technology can be put in place to detect potential malware traffic on th e network? - IDS A wireless deauthentication attack is an example of which type of attack: - Denial of Service Attack
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller PossibleA. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.99. You're not tied to anything after your purchase.