WGU C172 Network and Security Foundations (WGUC172)
Western Governors University
Page 2 out of 26 results
Sort by
-
(ACE FOR 2024/2025 EXAM REVIEW) Network and Security Foundations Practice Test (WGU C172). Questions and answers, 100% Accurate, rated A+
- Exam (elaborations) • 6 pages • 2023
-
Available in package deal
-
- $8.99
- + learn more
Network and Security Foundations 
Practice Test (WGU C172). Questions 
and answers, 100% Accurate, rated A+ 
Two or more computers connected together over a wide geographical area (e.g. county, country, globe). 
What type of network is this? - -WAN 
Which of the following cloud computing solutions will deliver software applications to a client either 
over the internet or on a local area network? - -SaaS 
With regards to AAA, ________ defines what the user can access and in what manner. - - ...
-
WGU C172 - Network and Security Foundations – Firewalls. Questions and answers, 100% Accurate. Graded A+ 2024
- Exam (elaborations) • 4 pages • 2023
- Available in package deal
-
- $7.99
- + learn more
Firewall - -A part of a computer system or network designed to block unauthorized access while 
permitting outward communication. 
Stateful Inspection Firewall - -The inbound and outbound data packets are compared to determine if 
a connection should be allowed. 
Proxy Server - -The client gets access to the network via the ____________________________. This 
step is used to authenticate the user, establish the session, and set policies. 
Packet Filtering Firewall - -Can also limit information m...
-
WGU C172 Network and Security - Foundations; PA and OA set. Questions and answers. 100% Accurate. Rated A+ | 32 Pages
- Exam (elaborations) • 32 pages • 2023
- Available in package deal
-
- $20.49
- + learn more
It is a network of users that share computer resources in a limited area. - -LAN 
Local Area Network - -LAN 
How are Local Area Networks defined? - -In terms of protocol and the topology used for accessing 
the network. 
A set of rules established for users to exchange information - -Protocol 
The network architecture used to interconnect the networking equipment. - -Topology 
What are the most common topologies for LANs? - -Ring, Bus, and Star 
Uses a token that is placed in the data channel an...
-
WGU C172 Network and Security Foundations, Questions and answers. APPROVED EXAM Predictor 2024
- Exam (elaborations) • 19 pages • 2023
- Available in package deal
-
- $15.49
- + learn more
TCP/IP (Transmission Control Protocol/Internet Protocol) - -A set of protocols made up of four layers 
(Application, Transport, Network, Network Interface Layer) used to connect network devices to each 
other 
Network Interface Layer (TCP/IP) - -TCP/IP model layer that establishes how data should be physically 
sent through the network. 
Ethernet 
In conjunction with layers 1 PHYSICAL and 2 DATA LINK 
Network Layer (TCP/IP) - -TCP/IP model layer that defines the logical transmission protocols fo...
-
WGU C172 Network and Security Foundations Pre-Assessment Questions and answers, 100% Accurate. VERIFIED 2023
- Exam (elaborations) • 5 pages • 2023
- Available in package deal
-
- $7.99
- + learn more
A very popular intrusion approach thanks to its success rate is what? - -Social Engineering 
The physical architecture of a computer network is known as its ____. - -Topologies 
The 802.11 wireless LAN uses what in order to identify the wireless traffic that is permitted to connect? - 
-SSID 
PING uses ____to verify a network connection. - -ICMP 
Which of the following is not a function of a bridge? - -To forward traffic based on a layer 3 address 
You have a network ID of 192.168.55.0 and you n...
Want to regain your expenses?
-
WGU C172 Network and Security Foundations Exam Review. Latest update, 100% Accurate 2024
- Exam (elaborations) • 11 pages • 2023
- Available in package deal
-
- $13.49
- + learn more
TCP/IP - -Known as Transmission Control Protocol/internet protocol and is a set of protocols used to 
connect network devices to each other 
Application Layer (TCP/IP) - -TCP/IP layer that is responsible for the communication protocols 
between nodes, such as HTTP, SSH, and NTP 
Transport Layer (TCP/IP) - -TCP/IP layer that is responsible for the end-to-end transport of data, such 
as TCP and UDP 
Network Layer (TCP/IP) - -TCP/IP layer that defines the logical transmission protocols for the whol...
-
WGU C172 Network and Security Foundations Chapter 6 Exercise. Questions and answers, 100% Accurate, rated A+ 2024
- Exam (elaborations) • 3 pages • 2023
- Available in package deal
-
- $7.99
- + learn more
In TCP/IP model,____layer processes requests from hosts to ensure a connection is made to the 
appropriate port - -application 
The binary value for the decimal number 49 is - - 
Decimal equivalent of is - -37 
Decimal equivalent of is - -170 
Decimal equivalent of is - -240 
Binary equivalent of 120 is - - 
Private IP addresses can be used on the Internet - -FALSE 
The IPv4 is typically expressed in____format for the user - -dotted decimal 
The IP address 192.168.12.2 is an example of____for...
-
WGU C172 Network and Security Foundations Chapter 3 Questions and answers, graded A+. VERIFIED 2024
- Exam (elaborations) • 2 pages • 2023
- Available in package deal
-
- $7.99
- + learn more
Which of the following are advantages of optical communication links? - -1. Security 
2. Extremely wide bandwidth 
3. Elimination of crosstalk 
What is the "two deep" rule relative to optical networking? - -This means that a building should only 
have the main distribution and the intermediate distribution that feeds the horizontal distribution to the 
work area 
What is the name of the optical-to-fiber interface used at 1 gigabit? - -GBIC 
The broadening of a pulse due to different propagatio...
-
WGU C172 Network and Security Foundations (v4): Unit 3&4: Terms, Full Review. Graded A+ 2024
- Exam (elaborations) • 11 pages • 2023
- Available in package deal
-
- $13.49
- + learn more
Asset - -A person, device, location, or information that SecOps aims to protect from attack. 
Attack - -An action taken by a threat that exploits a vulnerability that attempts to either block 
authorized access to an asset, or to gain unauthorized access to an asset. 
Risk - -The potential of a threat to exploit a vulnerability via an attack. 
SecOps (IT security operations) - -A discipline responsible for protecting assets by reducing the risk of 
attacks. 
Threat - -Something or someone that c...
-
WGU C172 Network And Security Foundations. Exam Review Questions & Ans. Latest Update. Verified 2024
- Exam (elaborations) • 9 pages • 2023
- Available in package deal
-
- $11.49
- + learn more
OSI Model Layer 1 - -Physical 
The Physical layer represents the physical medium that connects the computers together. 
OSI Model Layer 2 - -Data Link 
represents how computers logically connect to the network. Protocols at Layer 2 define how computers 
can share access to a common medium, such as a wired or wireless network. This includes protocols 
such as 802.3 Ethernet and 802.11 Wi-Fi. 
OSI Model Layer 3 - -Network 
allows computers on different networks to exchange data. 
OSI Model Layer 4...
How much did you already spend on Stuvia? Imagine there are plenty more of you out there paying for study notes, but this time YOU are the seller. Ka-ching! Discover all about earning on Stuvia