WGU C172 Network and Security Hypervisors and Cloud Computing Exam Review Questions and Answers updated 2024/2025
7 views 0 purchase
Course
WGU C172 Network & Security
Institution
WGU C172 Network & Security
WGU C172 Network and Security Hypervisors and Cloud Computing Exam Review Questions and Answers updated 2024/2025
PaaS (Platform as a Service) - correct answer A service that focuses on application development on any desired platform utilizing cloud computing
SaaS (Software as a Service) - co...
WGU C172 Network and Security Hypervisors
and Cloud Computing Exam Review Questions
and Answers updated 2024/2025
PaaS (Platform as a Service) - correct answer A service that focuses on application
development on any desired platform utilizing cloud computing
SaaS (Software as a Service) - correct answer A service that focuses on application
delivery
public cloud - correct answer cloud infrastructure operated by the cloud service
company but made available for general public use
private cloud - correct answer cloud infrastructure operated by the organization and
made available only to members of the organization
community cloud - correct answer cloud infrastructure that offers two or more
organizations exclusive access to the infrastructure and computing resources
hybrid cloud - correct answer cloud infrastructure that offers a combination of at least
one private cloud and one public cloud
SAN (storage area network) - correct answer a block-level data storage located across
a network; a typical enterprise storage solution
LUN (Logical Unit Number) - correct answer unique identifiers for a SAN;
IP addresses of the file servers
Fibre Channel (FC) - correct answer The original high-speed technology used to
connect data storage to servers;
uses fiber-optic cables to connect storage devices into a network
,IB (Infiniband) - correct answer A technology that provides high performance and high
throughput with low latency;
fastest storage interface, with speed of 200Gbps
FCoE (Fibre Channel over Ethernet) - correct answer A technology that
encapsulates Fibre Channel frames over Ethernet networks allowing FC to use 10Gbps
(or higher) Ethernet networks
while preserving the
FC protocol; jumbo frame supported
NAS (Network Attached Storage) - correct answer a file-level storage device that can
be accessed on a network;
available on FTP, NFS, AFP, SMB
Social Engineering - correct answer A process by which an intruder obtains enough
information from people to gain access to the network
Password Cracking - correct answer An attack in which the attacker tries to guess the
user's password
Dictionary Attack - correct answer An attack that uses known passwords and many
variations (upper- and lowercase and combinations) to try to log in to an account
Brute-Force Attack - correct answer An attack in which the attacker uses every
possible combination of characters to guess the password
Packet Sniffing - correct answer A technique in which the contents of data packets are
watched
,Man-in-the-Middle - correct answer An attack in which an attacker can seamlessly
place itself in the middle of a conversation between others in order to become the
recipient of all information sent by victim computers
ARP Cache Poisoning - correct answer An attack in which an attacker changes the
MAC addresses of the ARP cache, or "poisons the ARP cache" of victims to the MAC
address of the attacker so that conversations get redirected to the attacker
Evil Twin - correct answer A situation in which a rogue wireless access point poses as
a legitimate one by broadcasting a legitimate SSID and eavesdrops on the wireless
network
Session Hijacking - correct answer Exploiting web session control by stealing a
session cookie and using it to establish a session with a remote server that still thinks
the session is valid
Buffer Overflow - correct answer A situation that occurs when a program tries to put
more data into a buffer than it was configured to hold
nmap - correct answer A Linux and Windows port scanner
Penetration Testing - correct answer Evaluating the security of a user's network by
trying to exploit vulnerabilities
Virus - correct answer A piece of malicious computer code that, when opened, can
damage hardware, software, or other files
Worm - correct answer A type of virus that attacks computers, typically proliferates by
itself, and can deny service to networks
Malware (Malicious Software) - correct answer any program intended to harm, disrupt,
deny, or gain unauthorized access to a computing system
, Zero-Day Attack - correct answer An attack that exploits a software vulnerability that is
unknown to the developer
DoS (Denial of Service) - correct answer An attack in which service is denied to a
computer, network, or server
Spoof - correct answer To insert a different IP address in place of an IP packet's
source address to make it appear that a packet came from another network
Reflective/Amplified DoS Attack - correct answer An attack that uses spoofing to carry
out the attack and is a combination of a reflection attack and an amplification attack
Coordinated Attack - correct answer A type of distributed denial of service attack that is
deliberate toward a specific target and orchestrated by a controller source like the
command-and-control server in a botnet
botnet - correct answer a group of infected/compromised computers on the Internet
that are used to launch coordinated DoS attacks against another system on the network
NAQC (Network Access Quarantine Control) - correct answer Windows server
resource kit tool that allows admins to prevent remote clients from connecting to
network
Firewall - correct answer Hardware or software used to protect a computer network
Access Control List (ACL) - correct answer A basic form of firewall protection involving
a list of permissions attached to an object
access-list permit ip any any - correct answer The instruction added to the last line of
an access list to allow all other data packets to enter and exit the router
DMZ (Demilitarized Zone) - correct answer An area used to isolate servers
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller KieranKent55. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.