Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C957 Network and Security Foundations Real Exam Questions and Answers

Rating
-
Sold
-
Pages
29
Grade
A+
Uploaded on
09-01-2025
Written in
2024/2025

A network is being created for an office, and there is a need for a router that manages internal network connections with no contact with the internet. Which type of router is needed? - 1. A Core Router is a router designed to operate in the internet backbone, or core. It's responsible for routing high-speed data sent within the network, but it doesn't handle data traffic between multiple networks. -Correct 2. A Subscriber Edge Router is located at the edge of the subscriber's LAN. It primarily serves as a gateway for the subscriber to access the rest of the internet. 3. A Broadband Router is used to connect computers to the internet using Ethernet cables. It provides both wired and wireless connectivity. 4. An Inter-provider Border Router is used to link ISP networks. It's not typically used in small office or home networks. An IT manager is designing a new network and needs a device that connects multiple networks. Which device is needed? - 1. Router - Correct 2. Switch 3. Modem 4. Server A network in a small office building connects all devices using wired connections with a star topology. Which type of network is being described? - 1. LAN - Correct 2. WAN 3. CAN 4. WLAN An executive uses Bluetooth to connect a laptop, a mobile phone, and a headset Which type of network is described? - 1. PAN - Correct 2. SAN 3. MAN 4. WLAN A city uses fiber optic cable to connect smaller networks throughout the whole city. Which type of network is being described? - 1. WLAN 2. SAN 3. WAN 4. MAN - Correct Users of network have been experiencing issues. In the course of troubleshooting, an administrator wants to view a list of network addresses and port numbers. Which command in Linux should be used for this purpose? - 1. ifconfig 2. traceroute 3. ping 4. netstat - Correct Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to determine which ports have an active connections. Which command in Windows should be used for this purpose? - 1. tracert 2. netstat -an 3. arp -a 4. ipconfig In the process of setting up a Linux-based network system, a technician needs to view network interfaces and their settings. Which command should be used? - 1. ifconfig - Correct 2. dig 3. nslookup 4. ping A person is troubleshooting a network issue and needs to test DNS connectivity. Which Linux command should be used? - 1. ifconfig 2. netstat 3. nslookup - Correct 4. traceroute What is the TCP/IP layer that includes the Transmission Control Protocol (TCP)? - 1. Application 2. Transport - Correct 3. Network or Internet 4. Physical or Network Access Which layer if the TCP/IP model includes the Internet Message Access Protocol (IMAP)? - 1. Application - Correct 2. Physical or network Access 3. Transport 4. Network or Internet Which OSI model layer creates maintains, and disconnects process communications over the network? - 1. Application 2. Transport - Correct 3. Physical 4. Session Which OSI model layer is responsible for breaking data into packets? - 1. Transport - Correct 2. Physical 3. Session 4. Application Which layer of the OSI reference model includes all computer programs that interact with the network? - 1. Presentation 2. Application - Correct 3. Transport 4. Physical What is the OSI model layer that includes the IPX? - 1. Network - Correct 2. Transport 3. Application 4. Session What is the layer of the OSI model that is responsible for logical addressing? - 1. Data Link 2. Physical 3. Transport 4. Network - Correct What is the layer of the OSI model that translates binary computer language into the language of the transmission medium? ` - 1. Transport 2. Session 3. Presentation - Correct 4. Physical A company uses cloud service to manage its IT resources. The underlying hardware resources are shared by other companies as well. What is the cloud deployment model described in the scenario? - 1. Public 2. Hybrid 3. Private 4. Multi An organization uses one cloud service provider for data management and another service provider for developmental platforms What is the cloud deployment model described in the scenario? - 1. Hybrid - Correct 2. Public 3. Multi 4. Community A company needs to maximize the number of virtual machines that can run on each host. Which hypervisor should be used? - 1. Proprietary 2. Type 1 - Correct 3. Type 2 4. Open Source A developer has an existing computer with an operating system. The developer wants to use a hypervisor to have access to several virtual machines for a specific project. Which form of hypervisor fits the need described in the scenario? - 1. Type 2 - Correct 2. Type 1 3. Open Source 4. Proprietary An attacker gains unauthorized access to a computer and modifies browser security settings. What is the purpose of the attack? - 1. Launch Point 2. Data Modification - Correct 3. Denial of Availability 4. Data Export An attacker uses a trojan horse to forward usernames and passwords to an anonymous email address. What is the purpose of the attack? - 1. Denial of Availability 2. Data Export - Correct 3. Launch Point 4. Data Modification A hacker purposefully breaks IT security to gain unauthorized access to systems and publish sensitive data. What term describes the given hacker? - 1. White-hat 2. Black-hat - Correct 3. Blue-hat 4. Gray-Hat A hacker acts as an information security professional who is hired to preform penetration testing. Which term describes the given hacker? - 1. Black-hat 2. Grey-hat 3. White-hat - Correct 4. Blue-hat

Show more Read less
Institution
Course










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Course

Document information

Uploaded on
January 9, 2025
Number of pages
29
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$13.50
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
boomamor2 NURSING
Follow You need to be logged in order to follow users or courses
Sold
1025
Member since
4 year
Number of followers
733
Documents
3711
Last sold
1 month ago

4.0

116 reviews

5
60
4
24
3
16
2
4
1
12

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions