WGU C172 Network and Security Foundations (WGUC172)
Western Governors University
Page 2 out of 26 results
Sort by
-
(ACE FOR 2024/2025 EXAM REVIEW) Network and Security Foundations Practice Test (WGU C172). Questions and answers, 100% Accurate, rated A+
- Exam (elaborations) • 6 pages • 2023
-
Available in package deal
-
- $8.99
- + learn more
Network and Security Foundations 
Practice Test (WGU C172). Questions 
and answers, 100% Accurate, rated A+ 
Two or more computers connected together over a wide geographical area (e.g. county, country, globe). 
What type of network is this? - -WAN 
Which of the following cloud computing solutions will deliver software applications to a client either 
over the internet or on a local area network? - -SaaS 
With regards to AAA, ________ defines what the user can access and in what manner. - - ...
-
WGU C172 - Network and Security Foundations – Firewalls. Questions and answers, 100% Accurate. Graded A+ 2024
- Exam (elaborations) • 4 pages • 2023
- Available in package deal
-
- $7.99
- + learn more
Firewall - -A part of a computer system or network designed to block unauthorized access while 
permitting outward communication. 
Stateful Inspection Firewall - -The inbound and outbound data packets are compared to determine if 
a connection should be allowed. 
Proxy Server - -The client gets access to the network via the ____________________________. This 
step is used to authenticate the user, establish the session, and set policies. 
Packet Filtering Firewall - -Can also limit information m...
-
WGU C172 Network and Security - Foundations; PA and OA set. Questions and answers. 100% Accurate. Rated A+ | 32 Pages
- Exam (elaborations) • 32 pages • 2023
- Available in package deal
-
- $20.49
- + learn more
It is a network of users that share computer resources in a limited area. - -LAN 
Local Area Network - -LAN 
How are Local Area Networks defined? - -In terms of protocol and the topology used for accessing 
the network. 
A set of rules established for users to exchange information - -Protocol 
The network architecture used to interconnect the networking equipment. - -Topology 
What are the most common topologies for LANs? - -Ring, Bus, and Star 
Uses a token that is placed in the data channel an...
-
WGU C172 Network and Security Foundations, Questions and answers. APPROVED EXAM Predictor 2024
- Exam (elaborations) • 19 pages • 2023
- Available in package deal
-
- $15.49
- + learn more
TCP/IP (Transmission Control Protocol/Internet Protocol) - -A set of protocols made up of four layers 
(Application, Transport, Network, Network Interface Layer) used to connect network devices to each 
other 
Network Interface Layer (TCP/IP) - -TCP/IP model layer that establishes how data should be physically 
sent through the network. 
Ethernet 
In conjunction with layers 1 PHYSICAL and 2 DATA LINK 
Network Layer (TCP/IP) - -TCP/IP model layer that defines the logical transmission protocols fo...
-
WGU C172 Network and Security Foundations Pre-Assessment Questions and answers, 100% Accurate. VERIFIED 2023
- Exam (elaborations) • 5 pages • 2023
- Available in package deal
-
- $7.99
- + learn more
A very popular intrusion approach thanks to its success rate is what? - -Social Engineering 
The physical architecture of a computer network is known as its ____. - -Topologies 
The 802.11 wireless LAN uses what in order to identify the wireless traffic that is permitted to connect? - 
-SSID 
PING uses ____to verify a network connection. - -ICMP 
Which of the following is not a function of a bridge? - -To forward traffic based on a layer 3 address 
You have a network ID of 192.168.55.0 and you n...
Make study stress less painful
-
WGU C172 Network and Security Foundations Exam Review. Latest update, 100% Accurate 2024
- Exam (elaborations) • 11 pages • 2023
- Available in package deal
-
- $13.49
- + learn more
TCP/IP - -Known as Transmission Control Protocol/internet protocol and is a set of protocols used to 
connect network devices to each other 
Application Layer (TCP/IP) - -TCP/IP layer that is responsible for the communication protocols 
between nodes, such as HTTP, SSH, and NTP 
Transport Layer (TCP/IP) - -TCP/IP layer that is responsible for the end-to-end transport of data, such 
as TCP and UDP 
Network Layer (TCP/IP) - -TCP/IP layer that defines the logical transmission protocols for the whol...
-
WGU C172 Network and Security Foundations Chapter 6 Exercise. Questions and answers, 100% Accurate, rated A+ 2024
- Exam (elaborations) • 3 pages • 2023
- Available in package deal
-
- $7.99
- + learn more
In TCP/IP model,____layer processes requests from hosts to ensure a connection is made to the 
appropriate port - -application 
The binary value for the decimal number 49 is - - 
Decimal equivalent of is - -37 
Decimal equivalent of is - -170 
Decimal equivalent of is - -240 
Binary equivalent of 120 is - - 
Private IP addresses can be used on the Internet - -FALSE 
The IPv4 is typically expressed in____format for the user - -dotted decimal 
The IP address 192.168.12.2 is an example of____for...
-
WGU C172 Network and Security Foundations Chapter 3 Questions and answers, graded A+. VERIFIED 2024
- Exam (elaborations) • 2 pages • 2023
- Available in package deal
-
- $7.99
- + learn more
Which of the following are advantages of optical communication links? - -1. Security 
2. Extremely wide bandwidth 
3. Elimination of crosstalk 
What is the "two deep" rule relative to optical networking? - -This means that a building should only 
have the main distribution and the intermediate distribution that feeds the horizontal distribution to the 
work area 
What is the name of the optical-to-fiber interface used at 1 gigabit? - -GBIC 
The broadening of a pulse due to different propagatio...
-
WGU C172 Network and Security Foundations (v4): Unit 3&4: Terms, Full Review. Graded A+ 2024
- Exam (elaborations) • 11 pages • 2023
- Available in package deal
-
- $13.49
- + learn more
Asset - -A person, device, location, or information that SecOps aims to protect from attack. 
Attack - -An action taken by a threat that exploits a vulnerability that attempts to either block 
authorized access to an asset, or to gain unauthorized access to an asset. 
Risk - -The potential of a threat to exploit a vulnerability via an attack. 
SecOps (IT security operations) - -A discipline responsible for protecting assets by reducing the risk of 
attacks. 
Threat - -Something or someone that c...
-
WGU C172 Network And Security Foundations. Exam Review Questions & Ans. Latest Update. Verified 2024
- Exam (elaborations) • 9 pages • 2023
- Available in package deal
-
- $11.49
- + learn more
OSI Model Layer 1 - -Physical 
The Physical layer represents the physical medium that connects the computers together. 
OSI Model Layer 2 - -Data Link 
represents how computers logically connect to the network. Protocols at Layer 2 define how computers 
can share access to a common medium, such as a wired or wireless network. This includes protocols 
such as 802.3 Ethernet and 802.11 Wi-Fi. 
OSI Model Layer 3 - -Network 
allows computers on different networks to exchange data. 
OSI Model Layer 4...
Study stress? For sellers on Stuvia, these are actually golden times. KA-CHING! Earn from your study resources too and start uploading now. Discover all about earning on Stuvia