WGU C957 Network and Security Foundations Real Exam Questions and Answers
A network is being created for an office, and there is a need for a router that manages internal network connections with no contact with the internet. Which type of router is needed? - 1. A Core Router is a router designed to operate in the internet backbone, or core. It's responsible for routing high-speed data sent within the network, but it doesn't handle data traffic between multiple networks. -Correct 2. A Subscriber Edge Router is located at the edge of the subscriber's LAN. It primarily serves as a gateway for the subscriber to access the rest of the internet. 3. A Broadband Router is used to connect computers to the internet using Ethernet cables. It provides both wired and wireless connectivity. 4. An Inter-provider Border Router is used to link ISP networks. It's not typically used in small office or home networks. An IT manager is designing a new network and needs a device that connects multiple networks. Which device is needed? - 1. Router - Correct 2. Switch 3. Modem 4. Server A network in a small office building connects all devices using wired connections with a star topology. Which type of network is being described? - 1. LAN - Correct 2. WAN 3. CAN 4. WLAN An executive uses Bluetooth to connect a laptop, a mobile phone, and a headset Which type of network is described? - 1. PAN - Correct 2. SAN 3. MAN 4. WLAN A city uses fiber optic cable to connect smaller networks throughout the whole city. Which type of network is being described? - 1. WLAN 2. SAN 3. WAN 4. MAN - Correct Users of network have been experiencing issues. In the course of troubleshooting, an administrator wants to view a list of network addresses and port numbers. Which command in Linux should be used for this purpose? - 1. ifconfig 2. traceroute 3. ping 4. netstat - Correct Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to determine which ports have an active connections. Which command in Windows should be used for this purpose? - 1. tracert 2. netstat -an 3. arp -a 4. ipconfig In the process of setting up a Linux-based network system, a technician needs to view network interfaces and their settings. Which command should be used? - 1. ifconfig - Correct 2. dig 3. nslookup 4. ping A person is troubleshooting a network issue and needs to test DNS connectivity. Which Linux command should be used? - 1. ifconfig 2. netstat 3. nslookup - Correct 4. traceroute What is the TCP/IP layer that includes the Transmission Control Protocol (TCP)? - 1. Application 2. Transport - Correct 3. Network or Internet 4. Physical or Network Access Which layer if the TCP/IP model includes the Internet Message Access Protocol (IMAP)? - 1. Application - Correct 2. Physical or network Access 3. Transport 4. Network or Internet Which OSI model layer creates maintains, and disconnects process communications over the network? - 1. Application 2. Transport - Correct 3. Physical 4. Session Which OSI model layer is responsible for breaking data into packets? - 1. Transport - Correct 2. Physical 3. Session 4. Application Which layer of the OSI reference model includes all computer programs that interact with the network? - 1. Presentation 2. Application - Correct 3. Transport 4. Physical What is the OSI model layer that includes the IPX? - 1. Network - Correct 2. Transport 3. Application 4. Session What is the layer of the OSI model that is responsible for logical addressing? - 1. Data Link 2. Physical 3. Transport 4. Network - Correct What is the layer of the OSI model that translates binary computer language into the language of the transmission medium? ` - 1. Transport 2. Session 3. Presentation - Correct 4. Physical A company uses cloud service to manage its IT resources. The underlying hardware resources are shared by other companies as well. What is the cloud deployment model described in the scenario? - 1. Public 2. Hybrid 3. Private 4. Multi An organization uses one cloud service provider for data management and another service provider for developmental platforms What is the cloud deployment model described in the scenario? - 1. Hybrid - Correct 2. Public 3. Multi 4. Community A company needs to maximize the number of virtual machines that can run on each host. Which hypervisor should be used? - 1. Proprietary 2. Type 1 - Correct 3. Type 2 4. Open Source A developer has an existing computer with an operating system. The developer wants to use a hypervisor to have access to several virtual machines for a specific project. Which form of hypervisor fits the need described in the scenario? - 1. Type 2 - Correct 2. Type 1 3. Open Source 4. Proprietary An attacker gains unauthorized access to a computer and modifies browser security settings. What is the purpose of the attack? - 1. Launch Point 2. Data Modification - Correct 3. Denial of Availability 4. Data Export An attacker uses a trojan horse to forward usernames and passwords to an anonymous email address. What is the purpose of the attack? - 1. Denial of Availability 2. Data Export - Correct 3. Launch Point 4. Data Modification A hacker purposefully breaks IT security to gain unauthorized access to systems and publish sensitive data. What term describes the given hacker? - 1. White-hat 2. Black-hat - Correct 3. Blue-hat 4. Gray-Hat A hacker acts as an information security professional who is hired to preform penetration testing. Which term describes the given hacker? - 1. Black-hat 2. Grey-hat 3. White-hat - Correct 4. Blue-hat
Written for
- Institution
- Western Governors University
- Course
- WGU C957 (C957)
Document information
- Uploaded on
- January 9, 2025
- Number of pages
- 29
- Written in
- 2024/2025
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
wgu
-
c957
-
wgu c957
-
wgu c957 network and security foundations
-
wgu c957 network and security foundations exam
Also available in package deal