WGU C172 Network and Security Practice Study Guide Questions with Distinction level Marking scheme version 2024/2025
8 views 0 purchase
Course
WGU C172 Network & Security
Institution
WGU C172 Network & Security
WGU C172 Network and Security Practice Study Guide Questions with Distinction level Marking scheme version 2024/2025
What encryption algorithm uses the same pre-shared key to encrypt and decrypt data? - correct answer Symmetric
Which of the following describes a private cloud? - correct answe...
WGU C172 Network and Security Practice
Study Guide Questions with Distinction level
Marking scheme version 2024/2025
What encryption algorithm uses the same pre-shared key to encrypt and decrypt data? -
correct answer Symmetric
Which of the following describes a private cloud? - correct answer Provides cloud
services to a single organization
You have a small network that uses a switch to connect multiple devices. Which
physical topology are you using? - correct answer Star
Which of the following topologies connects each device to a neighboring device? -
correct answer Ring
Cynthia is working on her Western Governors University application online, when the
admissions website crashes. She is unable to turn in her application on time. What part
of the CIA Triad is affected? - correct answer Availability
What are two ways to protect a computer from malware? (Choose two) - correct
answer Use antivirus software and keep software up to date
Your company purchases a new bridge that filters packets based on the MAC address
of the destination computer. On which layer of the OSI model is this device functioning?
- correct answer Data Link
Which of the following describes a public cloud? - correct answer Provides cloud
services to just about anyone
Which of the following are examples of social engineering? (Choose two) - correct
answer Impersonation and Phishing
,Brian would like to secure his website. Which one of the following protocols is the best
choice for encrypting communication between a website and its users? - correct
answer TLS
Your manager has asked you to implement a wired network infrastructure that will
accommodate failed connections. Which of the following network topologies should you
implement? - correct answer Mesh
Which layer of the OSI model is responsible for the establishment, maintaining and
terminating the connection between two systems? - correct answer Session
A switch forwards data only to the port that are connected to the destination device. It
knows which port to forward it to based on which value? - correct answer MAC
Address
Which of the following wireless security protocols has been discouraged in favor of
newer standards due to known vulnerabilities resulting from implementation flaws? -
correct answer WEP
In a private cloud companies such as Amazon Web Services, Microsoft Azure, and
Google Cloud Platforms are responsible for the physical data center security concerns. -
correct answer False
Kim has taken her Network and Security Foundation exam and is waiting to get her
results by email. By accident, Kim's results are sent to Karen. What part of the CIA Triad
is affected? - correct answer Confidentiality
Amazon Web Services, Microsoft Azure, and Google Cloud Platform are responsible for
the physical data center security and most the physical hardware security concerns in
which cloud deployment? - correct answer Public Cloud
Which of the following topologies connects all devices to a single cable? - correct
answer Bus
, Which of the following hardware devices forwards a signal out all connected ports
without examining the frame or packet contents? - correct answer Hub
Starting at layer 1 and going to layer 7 what are the layers of the OSI model: - correct
answer physical, data link, network, transport, session, presentation, application
Which one of the following wireless encryption protocols is considered the weakest and
recommended to no longer use? - correct answer WEP
Bob receives a message from Alice that she sent using an asymmetric cryptography
algorithm. What key should he use to decrypt the message? - correct answer Bob's
private key
Which of the following would provide the most effective security for a small wireless
network? - correct answer WPA2
What does tracert do? - correct answer Determine the route a packet takes to a
destination
- takes advantage of ICMP time to live exceeded error message
Which of the following strategies involves sharing some of the risk burden with someone
else, such as an insurance company? - correct answer Risk transferrence
Nslookup - correct answer Used to determine IP address of a domain name.
Ping - correct answer Used to determine the IP address and latency in networks.
Netstat -a - correct answer Used to display IP ports currently open on the Windows
OS.
Whois - correct answer Information about a webserver including contact information.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller KieranKent55. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.49. You're not tied to anything after your purchase.