Package deal
WGU C172 EXAM PACKAGE DEAL GRADED A+
WGU C172 EXAM PACKAGE DEAL GRADED A+
[Show more]WGU C172 EXAM PACKAGE DEAL GRADED A+
[Show more]Application Layer - Interacts with application programs that incorporate a communication component such as your internet browser and email. Bus Topology - The computers share the media (coaxial cable) for data transmission. Cable Modem - A modem that can use the high bandwidth of a cable televisi...
Preview 4 out of 60 pages
Add to cartApplication Layer - Interacts with application programs that incorporate a communication component such as your internet browser and email. Bus Topology - The computers share the media (coaxial cable) for data transmission. Cable Modem - A modem that can use the high bandwidth of a cable televisi...
Occupational Safety and Health Act - OSH Act Occupational Safety and Health Administration - OSHA National Fire Protection Association - NFPA; creates standards and codes to help form safe environments and prevent accidents Code of Federal Regulations - CFR Emergency action plan - EAP Fire pre...
Preview 4 out of 42 pages
Add to cartOccupational Safety and Health Act - OSH Act Occupational Safety and Health Administration - OSHA National Fire Protection Association - NFPA; creates standards and codes to help form safe environments and prevent accidents Code of Federal Regulations - CFR Emergency action plan - EAP Fire pre...
Application Layer - HTTP and FTP are used as protocols Presentation Layer - Data conversion utilities. Protocol Conversion, data translation. Presentation Layer - Data encryption/decryption is done here. Presentation Layer - The layer that handles character encoding. Session Layer - Network Ope...
Preview 2 out of 7 pages
Add to cartApplication Layer - HTTP and FTP are used as protocols Presentation Layer - Data conversion utilities. Protocol Conversion, data translation. Presentation Layer - Data encryption/decryption is done here. Presentation Layer - The layer that handles character encoding. Session Layer - Network Ope...
ocial Engineering - A way for an intruder to obtain enough information from people to gain access to the network. Password Cracking - The attacker tries to guess the user's password. Dictionary Attack - Uses known passwords and variations (lower and uppercase letters) Brute Force Attack - Uses ...
Preview 2 out of 8 pages
Add to cartocial Engineering - A way for an intruder to obtain enough information from people to gain access to the network. Password Cracking - The attacker tries to guess the user's password. Dictionary Attack - Uses known passwords and variations (lower and uppercase letters) Brute Force Attack - Uses ...
penetration testers - This InfoSec job is tasked with attempting to compromise a network's security. Insider Threats - Some of the most potent threats come from people within your organization. Because they have legitimate access to systems, they are in a position to hack from the inside of the ...
Preview 2 out of 6 pages
Add to cartpenetration testers - This InfoSec job is tasked with attempting to compromise a network's security. Insider Threats - Some of the most potent threats come from people within your organization. Because they have legitimate access to systems, they are in a position to hack from the inside of the ...
Fiber Optic Cable - uses light instead of electricity Fiber Optic Cable - can go longer distances and faster Fiber Optic Cable - more durable and secure Coaxial cable - mostly used by cable TV companies to connect their customers to the company's facilities. Fiber Optic Cable - similar to tran...
Preview 1 out of 2 pages
Add to cartFiber Optic Cable - uses light instead of electricity Fiber Optic Cable - can go longer distances and faster Fiber Optic Cable - more durable and secure Coaxial cable - mostly used by cable TV companies to connect their customers to the company's facilities. Fiber Optic Cable - similar to tran...
802.11a/Wireless-A - wireless 5GHz - 54Mbps - *75ft* 802.11b/Wireless-B - wireless 2.4GHz - *11Mbps* - 100-150ft 802.11g/Wireless-G - 2.4GHz - *54Mbps - 150ft* 802.11ac/Wireless-AC - 5GHz - *1.3Gbps* 802.11n/Wireless-N - 2.4GHz - *200+Mbps* 2.4GHz - Frequency ranges of 802.11G/802.11B 5GHz - F...
Preview 2 out of 5 pages
Add to cart802.11a/Wireless-A - wireless 5GHz - 54Mbps - *75ft* 802.11b/Wireless-B - wireless 2.4GHz - *11Mbps* - 100-150ft 802.11g/Wireless-G - 2.4GHz - *54Mbps - 150ft* 802.11ac/Wireless-AC - 5GHz - *1.3Gbps* 802.11n/Wireless-N - 2.4GHz - *200+Mbps* 2.4GHz - Frequency ranges of 802.11G/802.11B 5GHz - F...
Firewall - A part of a computer system or network designed to block unauthorized access while permitting outward communication. Stateful Inspection Firewall - The inbound and outbound data packets are compared to determine if a connection should be allowed. Proxy Server - The client gets access ...
Preview 1 out of 4 pages
Add to cartFirewall - A part of a computer system or network designed to block unauthorized access while permitting outward communication. Stateful Inspection Firewall - The inbound and outbound data packets are compared to determine if a connection should be allowed. Proxy Server - The client gets access ...
Site surveys obtain the following information. (Choose all that apply.) Electrical power Supported bandwidth Connection points to the main network. RF coverage - ans Electrical power Supported bandwidth Connection points to the main network. RF coverage MIMO uses wave division multiplexing. ...
Preview 4 out of 33 pages
Add to cartSite surveys obtain the following information. (Choose all that apply.) Electrical power Supported bandwidth Connection points to the main network. RF coverage - ans Electrical power Supported bandwidth Connection points to the main network. RF coverage MIMO uses wave division multiplexing. ...
PING - is one of the most basic tools for testing connectivity to other hosts. It sends an internet control message protocol (ICMP) echo request to a host and listens for the reply Traceroute/tracert - are used to trace the route an IP packet takes to a destination. It displays each hop (next rou...
Preview 1 out of 3 pages
Add to cartPING - is one of the most basic tools for testing connectivity to other hosts. It sends an internet control message protocol (ICMP) echo request to a host and listens for the reply Traceroute/tracert - are used to trace the route an IP packet takes to a destination. It displays each hop (next rou...
protocol - The set of rules established for users to exchange information topology - The network architecture used to interconnect the networking equipment deterministic network - Each station connected to the network is ensured access for transmission of its messages at regular or fixed time int...
Preview 3 out of 24 pages
Add to cartprotocol - The set of rules established for users to exchange information topology - The network architecture used to interconnect the networking equipment deterministic network - Each station connected to the network is ensured access for transmission of its messages at regular or fixed time int...
It is a network of users that share computer resources in a limited area. - LAN Local Area Network - LAN How are Local Area Networks defined? - In terms of protocol and the topology used for accessing the network. A set of rules established for users to exchange information - Protocol The netwo...
Preview 3 out of 21 pages
Add to cartIt is a network of users that share computer resources in a limited area. - LAN Local Area Network - LAN How are Local Area Networks defined? - In terms of protocol and the topology used for accessing the network. A set of rules established for users to exchange information - Protocol The netwo...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller PatrickKaylian. Stuvia facilitates payment to the seller.
No, you only buy these notes for $22.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
70073 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 15 years now