100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
Previously searched by you
WGU C172 Network and Security Foundations Final Certification Study Guide Exam Questions with Certified for Accuracy Answers 2024/2025$13.99
Add to cart
WGU C172 Network and Security Foundations Final Certification Study Guide Exam Questions with Certified for Accuracy Answers 2024/2025
2 views 0 purchase
Course
WGU C172 Network & Security
Institution
WGU C172 Network & Security
WGU C172 Network and Security Foundations Final Certification Study Guide Exam Questions with Certified for Accuracy Answers 2024/2025
Firewall - correct answer Hardware or software used to protect a computer network
Access Control List (ACL) - correct answer A basic form of firewall protecti...
WGU C172 Network and Security Foundations
Final Certification Study Guide Exam
Questions with Certified for Accuracy Answers
2024/2025
Firewall - correct answer Hardware or software used to protect a computer network
Access Control List (ACL) - correct answer A basic form of firewall protection involving
a list of permissions attached to an object
SM - correct answer Single mode
SONET/SDH - correct answer Synchronous optical network; protocol standard for
optical transmission in long-haul communication/synchronous digital hierarchy
STS - correct answer Synchronous transport signals
Tunable Laser - correct answer Laser in which the fundamental wavelength can be
shifted a few nanometers, ideal for traffic routing in DWDM systems
Vertical Cavity Surface Emitting Lasers (VCSELs) - correct answer Lasers with the
simplicity of LEDs and the performance of lasers
Packet Filtering - correct answer Protection in which a limit is placed on the information
that can enter the network
Proxy Server - correct answer A setup in which clients go through a proxy to
communicate with secure systems
Stateful Firewall - correct answer A firewall that keeps track of data packet flow
,IDS and IPS (Intrusion Detection System; Intrusion Prevention System) - correct
answer Systems that identify misuse and anomalies on a network
Packet Shaper - correct answer A device that sits between a campus network and an
outside network and is configured with a set of rules that are used to prioritize data
traffic for shaping the bandwidth
Authentication, Authorization, and Accounting (AAA) - correct answer A framework
developed to control access to computing resources, enforce policies, and audit usage
WEP (Wired Equivalent Privacy) - correct answer wireless security protocol that
encrypts and decrypts wireless data packets;
uses RC4 algorithm for encryption but does not use a key management;
initialization vector is only 24 bits in size and is always static
WPA (Wi-Fi Protected Access) - correct answer improved wireless security protocol
that supports user authentication provided by 802.1x;
uses RC4 algorithm for encryption;
provides a key management mechanism via TKIP and file integrity monitoring
AES (Advance Encryption Standard) - correct answer encryption algorithm used by
WPA2
Wide Area Network (WAN) - correct answer A network that uses the
telecommunications network to interconnect sites that are geographically distributed
throughout a region, a country, or the world
Cable Modem - correct answer A modem that can use the high bandwidth of a cable
television system to deliver high-speed data to and from the service provider
,Client - correct answer A computer connected to a network that accesses services
from the server
Peer - correct answer A computer that uses and provides resources to a network
Peer-to-Peer Network - correct answer A network in which all computers in the network
provide similar services, including server functions
Client/Server Network - correct answer A network in which the server handles multiple
requests from multiple clients for multiple services
DNS (Domain Name Service) - correct answer The service that translates URLs to IP
addresses and vice versa
layer 3 network (routed network) - correct answer uses layer 3 addressing for selecting
routes to forward data packets
default gateway address - correct answer The IP address of the networking device
used to forward data that needs to exit the LAN
physical layer - correct answer layer 1 of the OSI model, which provides the electrical
and mechanical connection to the network
data link layer - correct answer layer 2 of the OSI model, which handles error recover,
flow control (synchronization), and sequencing
network layer - correct answer layer 3 of the OSI model, which accepts outgoing
messages and combines messages or segments into packets, adding a header that
includes routing information
, transport layer - correct answer layer 4 of the OSI model, which is concerned with
message integrity between source and destination
session layer - correct answer layer 5 of the OSI model, which provides the control
functions necessary to establish, manage, and terminate the connections
presentation layer - correct answer layer 6 of the OSI model, which accepts and
structures the messages for the application
application layer - correct answer layer 7 of the OSI model, which interacts with
application programs that incorporate a communication component such as your
internet browser and email
star topology - correct answer the most common networking topology in today's LANs,
where all networking devices connect to a central switch or hub; includes twisted-pair
cables with modular plugs which are used to connect the computers and other
networking devices
bus topology - correct answer a system in which the computers share the media;
includes coaxial cable which is looped through each networking device to facilitate data
transfer
mesh topology - correct answer connects all networking devices directly to each other
which provides full redundancy in the network paths
LAN (local area network) - correct answer network of users that share computer
resources in a limited area
topology - correct answer architecture of a network
token ring topology - correct answer a network topology configured in a logical ring that
complements the token passing protocol
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller KieranKent55. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.99. You're not tied to anything after your purchase.