Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Other

WGU C 172 Networking and Security Foundations Study Guide 9 2021/2022

Rating
-
Sold
-
Pages
234
Uploaded on
27-01-2022
Written in
2021/2022

WGU C 172 Networking and Security Foundations Study Guide 9 2021/2022

Institution
Course

Content preview

Networking and Security Foundations – Study Guide

Pre-Test Review

,IMAP can allow a user with multiple devices to - access their emails simultaneously from any devices.

Redundancy in a network is necessary - to ensure throughput and connectivity through multiple nodes and pathways.

In the SMTP server to server set up, the email clients serve to – Receive/Send and queue messages between SMTP servers and
clients.

The OSI Model is used to – describe how communications happen across a network.

Which layer is the network layer in the OSI 7 layer model – 3

In the OSI model, all of the following are protocols of the application layer except: - ICANN

Which of the following is NOT one of the seven layers of the OSI Model? – Domain Layer

Which protocol below is used to format most data packets for transmission over the Internet? – TCP/IP

In MPLS switching the routing decision is made – by the first routing device and forms the predefined path for subsequent
routers.

Ethernet usually permits each node in the network to transmit data packets at any time which can cause – Data collision

What is the backbone network – a high-capacity connectivity infrastructure that forms the main link to the different sub
networks connected to it

A Serial backbone network cannot be applied at enterprise level due to its high susceptibility to faults.

What is Simplex mode of communication? – Only one sender and receiver

Which of these is an advantage of time multiplexing with regard to resource monopolization? – Ensures fair use of the resource

What part of an optical fiber cable reflects light back into the core as the cable bends? - Cladding

If you wanted to connect a WAN (Wide Area Network) with a high-level of resiliency, what technique would you use? - A full
mesh design

What type of bit is used with an asynchronous transmission to signal the beginning and end of a byte of data? – Control

A data measurement unit that contains 8 bits of information is known as which of the following? - Byte

-----is NOT a type of server – Redundant power supply server

A specially built server: - is built with redundant power supplies to maintain constant availability

Science and engineering orbital data are made accessible to the general public by use of the _____ - Internet-to-orbit

Which of the following is FALSE about LAN cards? – A computer can only have one LAN card.

What is required for a VPN to function correctly? – Encryption and authentication protocols

A computer can be accessed over the Internet via a host name or _____which is a unique numerical sequence assigned to a
machine on a network. – IP address

An IPv4 Address is how many bits in length? – 32 bits

What access method works best over mobile connections? – Mosh

A remote employee needs to be able to access corporate email and file sharing but doesn’t necessarily have a lot of technical
knowledge. – VPN

Why is Telnet discouraged as an access method? – Telnet is unsecure

Which internet protocol is responsible for re transmitting lost or erroneous data packets? – TCP

,In a company setup where users are required to work from home when needed, what is the best address translation? – Static
NAT

How do signals travel between a GPS satellite and on-the-ground GPS receiver? – Only from the satellite to the receiver

The 802.11n Protocol makes use of _____technology: - Multiple Input/Multiple Output (MIMO)

Relative to other technologies such as Bluetooth, WiFi and cellular, Zigbee provides wireless communication that provided
_____. – Lower cost and longer battery life.

Which of the following wireless communication technologies does not travel through walls and needs line-of-sight to
communicate? - Infrared

The latest video compression format is_____- H.264

PSTN stands for: - Public Switched Telephone Network

MPLS makes use of _____to make a faster and more efficient network. – Short path labels

Which acronym refers to the network name that your router broadcasts so you can find it? – SSID

What is the maximum number of zones that can be associated to a firewall? – Firewalls can have many zones associated to
them.

A firewall can be used to direct and control traffic _____. – both coming in and going out of your network

Which describes the best attitude about network names? – Never mention either the router name or the tech company that
built it.

The internet is an example of a _____ _____ Network. – Wide Area

A single point of failure (SPF) is _____. – a lone link in a network that can bring down the whole network if it fails

What does the acronym P2P stand for in the context of computer network architecture? – Peer-to-Peer

Computer networks allow users to share: - printers

The _____mail command starts the process of sending sequential lines of texts with the message – 354

The transport layer performs error checking, data packet creation and what other types of service? – Packet routing

SD-WAN is best used for which task? - Connecting branches to the cloud

Which of the following is/are true? - Wireless Access Points connect devices that have WI-FI or Bluetooth connectivity.

Which of the following statements is true? - Authoritative name servers respond to queries from recursive name servers

Which network topology uses concentration routers to interconnect star network WANs? - Tiered topology

A PCMCIA LAN card typically goes where? - Inside a laptop

Which of the following is NOT true with respect to a band pass filter? - The band pass filter is present at the sender's side.

POP is within what layer of the OSI Model? - layer 7

In order to check the nodes that are connected to a system, one can use the command – netstat

When Elliot plants malicious code on a corporate computer that will destroy files he is considered a _____. – cracker

What type of standards are built by the officials and network professionals in organizations? - Formal standards

Which computer network, built by a business, is used to to interconnect its various company sites in order to share computer
resources? – EPN

, What are the reasons for the degradation of a wireless signal? – Reflection, Diffraction, Scattering

Which two protocols are NOT backward compatible? - 802.11a Protocol 802.11b

What is the approximate distance between devices when establishing a connection using short-range wireless
communication? - From a few centimeters to several meters

IP Addresses operate within the _____ layer of the TCP/IP protocol. - Network Layer

Four types of WAN topologies are _____ - Mesh, star, ring, bus topologies

Which of the following is a transmission mode that transmits in two directions, but only in one direction at a time? –
Asynchronous

Which one of the communication channels allows for data to be sent and received in both directions, but not at the same
time? - Half-duplex

One of the other protocols that works along with POP is SMTP, which stands for: - Simple Mail Transport Protocol

In star-wired ring hybrid topology, a failure in one of the nodes of the main ring topology can lead to a breakdown of the
entire hybrid network. What can be done to ensure the network does not fail in such a case? - Making the ring topology to
be bidirectional

What is a single point of failure in a hybrid network topology? - It is a component of a hybrid network topology which
cause a total network failure on failing

How are the inherent weaknesses of star, ring, and bus topologies addressed in a hybrid topology? - When a combination
of two or more of the basic topologies is made into a hybrid network topology, the weaknesses of a given topology is
addressed by another

WEP affects _____ in a network. - wireless connections

Live threat-intelligence helps the firewall to identify and stop _____. - Threats that the firewall may have never seen
before.

When can a network security hardware appliance stop threats on the network? - When it is installed in line.

Which computer network, built by a business, is used to to interconnect its various company sites in order to share
computer resources? - EPN

Written for

Course

Document information

Uploaded on
January 27, 2022
Number of pages
234
Written in
2021/2022
Type
OTHER
Person
Unknown

Subjects

$20.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Aplusmaster Harvard University
Follow You need to be logged in order to follow users or courses
Sold
759
Member since
5 year
Number of followers
611
Documents
2003
Last sold
2 weeks ago
Aplusmaster

FOR THE BEST AND LATEST UDPDATES FOR ALL TYPES OF EXAMS, STUDY GUIDES, CASE STUDIES, CLASS DISCUSSIONS. TESTBANKS, ETC. ALSO, FEEL FREE AND WELCOME TO MESSAGE FOR PRE-ORDES, ORDERS OR ASK ANY QUESTION ABOUT MY DOCUMENTS

4.0

101 reviews

5
56
4
15
3
16
2
2
1
12

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions