100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C172 - Network and Security Foundational Practice Exam Questions with certified Answers 2024/2025 $12.49   Add to cart

Exam (elaborations)

WGU C172 - Network and Security Foundational Practice Exam Questions with certified Answers 2024/2025

 6 views  0 purchase
  • Course
  • WGU C172 Network & Security
  • Institution
  • WGU C172 Network & Security

WGU C172 - Network and Security Foundational Practice Exam Questions with certified Answers 2024/2025 Telnet and SSH - correct answer Allow remote management of accounts and devices, with SSH being encrypted Storage area network (SAN) - correct answer Allows access to storage devices specific...

[Show more]

Preview 3 out of 25  pages

  • November 2, 2024
  • 25
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU C172 Network & Security
  • WGU C172 Network & Security
avatar-seller
KieranKent55
WGU C172 - Network and Security
Foundational Practice Exam Questions with
certified Answers 2024/2025

Telnet and SSH - correct answer Allow remote management of accounts and devices,
with SSH being encrypted


Storage area network (SAN) - correct answer Allows access to storage devices
specifically


Wireless local area network (WLAN) - correct answer A LAN with wireless connectivity


Local area network (LAN) - correct answer Consists of computers connected within a
limited area


Personal area network (PAN) - correct answer Centered around a person and their
devices, often over Bluetooth or USB


Campus area network (CAN) - correct answer Provides networking of multiple LANs
across a limited area


Metropolitan area network (MAN) - correct answer Provides networking across a larger
area than a CAN, but smaller than a WAN


Wide area network (WAN) - correct answer Covers a large geographical area within its
network


Client-server network model - correct answer Distinct server and client for data storage
and access

,Peer-to-peer model (P2P) - correct answer No individually designated server or client,
each machine can act as both


Bus network topology - correct answer Single line of devices connected together by
one shared network cable


Ring topology - correct answer Network topology designed to combat traffic collisions


Star network topology - correct answer Improvement upon the bus topology,
composed of a central network device connected to various network devices


Mesh topology - correct answer Often drawn as a web of direct connections between
computers or nodes in a network


Centralization and Decentralization - correct answer Relates to the distribution of
control and decision-making


Virtualization - correct answer Relies on a hypervisor to create the virtual hardware for
devices


Type 1 hypervisors - correct answer Installed on a dedicated bare metal server


Type 2 hypervisors - correct answer Installed as an application on personal computers
or laptops


IaaS (Infrastructure as a Service) - correct answer Offers server, storage, and
networking virtualization maintained by the cloud provider


PaaS (Platform as a Service) - correct answer Cloud provider is responsible for the
virtual servers and services running on top of them

, SaaS (Software as a Service) - correct answer Allows consumers to store and publish
information without managing the underlying applications or infrastructure


Asset - correct answer Person, device, location, or information that SecOps aims to
protect


Attack - correct answer Action taken by a threat that exploits a vulnerability


Risk - correct answer The potential of a threat to exploit a vulnerability via an attack


SecOps - correct answer IT security operations responsible for protecting assets by
reducing the risk of attacks


Threat - correct answer Something or someone that can exploit a vulnerability to attack
an asset


Vulnerability - correct answer A weakness in software, hardware, facilities, or humans
that can be exploited by a threat


Purple team - correct answer Engages red and blue teams to debrief, cross-train, and
repeat


White hat hackers - correct answer IT professionals who specialize in penetrating
network security to improve security posture


Black hat hackers - correct answer Possess the knowledge and will to breach systems
for profit


Gray hat hackers - correct answer May or may not be IT professionals and may or may
not choose to break laws in pursuit of their hacking goals

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller KieranKent55. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75632 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.49
  • (0)
  Add to cart