(answered 2023) WGU C172 Network and Security - Foundations PA and OA set Completed!
It is a network of users that share computer resources in a limited area. - Answer LAN Local Area Network - Answer LAN How are Local Area Networks defined? - Answer In terms of protocol and the topology used for accessing the network. A set of rules established for users to exchange information - Answer Protocol The network architecture used to interconnect the networking equipment. - Answer Topology What are the most common topologies for LANs? - Answer Ring, Bus, and Star Uses a token that is placed in the data channel and circulates around the ring. - Answer Token Ring topology A deterministic network - Answer Token Ring Topology Each station connected to the network ensures access for transmission of its messages at regular or fixed time intervals - Answer Deterministic What are the disadvantages of the Token Ring system? - Answer 1. If an error changes the token pattern, it can cause the token to stop circulating. What is a disadvantage of the Token Ring system from the troubleshooting and maintenance? - Answer The token ring path must be temporarily broken or interrupted if a computer or any device on the network is to be removed or added to the network. What is a solution to the troubleshooting and maintenance disadvantages of the Token Ring system? - Answer Connect each computer or device on the network to a central token ring hub. A device that manages the passing of the token instead of relying on individual computers to pass it. - Answer Token ring hub How does the token ring hub improve the network? - Answer It improves the reliability of the network. Topology whereas the computers share the media or coaxial cable for data transmission. - Answer Bus topology The coaxial cable that is looped through each networking device to transmit data in a bus topology - Answer ThinNet In this topology, all devices on the network can see each other's data traffic. - Answer Bus topology Topology whereas each computer must wait for pauses in transmission or until the transmission from one device is complete before initiating a new transmission onto the network. - Answer Bus topology What are the disadvantages of a bus topology? - Answer "1. Data can be corrupted if ore than one device on the network transmits at the same time and will have to be resubmitted. 2. The use of the shared coaxial cable prevents data transmission from being very bandwidth-efficient." Which topology is seldomly used in modern networks? - Answer Bus topology What is the most common topology used in today's LANs? - Answer Star topology Topology that uses twisted-pair cables with modular plugs to connect computers and other networking devices. - Answer Star topology Topology whereas each device is connected to a switch or hub - Answer Star A switch or hub facilitates the transfer of data between networking devices in this topology - Answer star Transmits data to all the devices connected in the star network - Answer hub Also called a multiport repeater - Answer hub Not meant for large networks, but are still used in some smaller, slower speed LANs - Answer hub A transmission from a hub in a star network to all the devices in the network connected to the hub - Answer broadcast Stores the hardware or physical address for each device connected to its ports in a star network - Answer switch Sends data transmissions directly to the port of the destination device on the network - Answer switch The physical input/output interfaces to the networking hardware - Answer port Where the cables physically connect to each other or a central switch or hub - Answer Port Only the intended destination device on this network will see the data traffic - Answer star What is an advantage of the star topology? - Answer It improves the efficiency of the available bandwidth of the network What is an advantage of the star topology from the troubleshooting and maintenance? - Answer A device can be removed or added without disrupting other devices on the network All devices are connected to each other - Answer mesh topology What is an advantage of the mesh network? - Answer It provides full redundancy in the network data paths What is a disadvantage of the mesh network? - Answer The additional data paths increase the cabling cost and the network hardware cost. It is also very complex. What type of applications is the mesh topology suited for? - Answer high-reliability applications What type of applications is the mesh topology not suited for? - Answer general networking applications Open systems interconnect reference model - Answer OSI Who was the OSI model developed by? - Answer The International Organization for Standardization What year was the OSI model developed? - Answer 1984 What is the purpose of the OSI model? - Answer to enable different types of networks to be linked together What is OSI meant for? - Answer To provide a framework for networking devices that ensure compatibility in the network hardware and software. What is the OSI model meant to accelerate? - Answer The development of new networking technologies. What is layer 1 of the OSI model? - Answer Physical The layer of the OSI model that provides the electrical and mechanical connection to the network. - Answer physical UTP, fiber, and network interface cards are examples of which layer of the OSI model? - Answer physicaL What is layer 2 of the OSI model? - Answer Data link Layer of the OSI model that handles error recovery, flow control (synchronization), and sequencing (which terminals are sending and which are receiving) - Answer data link Also called the media access control layer - Answer data Link The layer of the OSI model where the Media Access Control or MAC, addressing is defined - Answer data lInk Where is the Ethernet 802.3 standard defined? - Answer In the MAC or media access control Also called the Ethernet address - Answer MAC or media access control MAC addresses are an example of which layer of the OSI model? - Answer data linK What is layer 3 of the OSI model? - Answer Network layer of the OSI model that accepts outgoing messages and combines messages or segments into packets, adding a header that includes routing information. - Answer network Acts as the network controller - Answer network layer of the OSI model Internet Protocol (IP) and internetwork packet exchange (IPX) are examples of which layer of the OSI model? - Answer networK What is layer 4 of the OSI model? - Answer Transport layer of the OSI model that is concerned with message integrity between source and destination - Answer transport layer of the osi model that also segments/reassembles the packes and handles flow control - Answer tRansport Transmission control protocol (TCP) and User Datagram Protocol are examples of which layer of the OSI model? - Answer transporT What is layer 5 of the osi model? - Answer Session layer of the osi model that provides the control functions necessary to establish, manage, and terminate the connections as required to satisfy the user request - Answer session Network File system (NFS) and Structured Query Language (SQL) are examples of which osi model layer? - Answer sessioN What is layer 6 of the osi model? - Answer Presentation layer of the osi model that accepts and structures the messages for the application. If necessary, it will translate one code to another - Answer presentation layer of the osi model that is also responsible for data compression and encryption - Answer pResentation American Standard Code for Information Interchange (ASCII) and Joint Photographic Experts Group (JPEG) are examples of which layer of the OSI model? - Answer presentatioN What is layer 7 of the osi model? - Answer Application layer of the osi model that interacts with application programs that incorporate a communication component such as your internet browser and email - Answer application layer of the osi model that is also responsible for logging the message in, interpreting the request, and determining what information is needed to support the request - Answer aPplication Hypertext Transfer Protocol (HTTP) for web browsing, File Transfer Protocol (FTP) for transferring files, and Simple Mail Transfer Protocol (SMTP) for email transmission are examples of which osi model layer? - Answer applicatioN What is step one of the three basic steps in the process of isolating a network problem? - Answer Is the connection to the machine down (layer 1) What is step two of the three basic steps in the process of isolating a network problem? - Answer Is the network down? layer 3 What is step three of the three basic steps in the process of isolating a network problem? - Answer Is a service on a specific machine down? layer 7 A reply from" response from a ping indicates whate?" - Answer A connection to the server is up A request timed out" response from a ping indicates what?" - Answer the network connection is down What is the function of the data link layer of the osi model? - Answer to provide for the flow of data MAC addresses What is the function of the network layer? - Answer to provide routing decisions IP, IPX What is the function of the transport layer of the osi model? - Answer to ensure error free packets What is the function of the session layer of the osi model? - Answer to establish, manage, and terminate NFS, SQL sessions What is the function of the presentation layer of the osi model? - Answer to ensure protocol conversion, data transactions ASCII, JPEG What is function of the application layer of the osi model? - Answer to support applications HTTP, FTP, and SMTP(email) Which networking protocol is used in most modern computer networks? - Answer Ethernet A carrier sense multiple access with collision detection protocol for local area networks - Answer Ethernet Must have the capability to detect data collisions (collision detection) to avoid two or more computers from attempting to broadcast a message at the same time. - Answer Ethernet systems Provide grouping of information for transmission - Answer packet What does the header of a packet consist of? - Answer The preamble, start frame delimiter, destination and source addresses, and length/type field Preamble, start frame delimiter, destination mac address, source address, length/type, data, pad, and frame check sequence. - Answer The structure of the Ethernet frame An alternating pattern of 1s and 0s used for synchronization - Answer The preamble of an Ethernet packet A binary 8 bit sequence of that indicates the start of the frame - Answer The start frame delimiter of an Ethernet packet The MAC address associated with the network adapter or Ethernet network interface card (NIC) - Answer The destination and source MAC addresses of an Ethernet packet An indication of the number of bytes in the data field if this value is less than 1500, or if the number is greater than 1500, and indication of the type of data format such as IP and IPX - Answer The length/type of the Ethernet packet frame The variable length of data being transferred from the source to the destiontion - Answer The data of the Ethernet packet frame A field used to bring the total number of bytes up to the minimum of 46 if the data field is less than 46 bytes - Answer The pad of the Ethernet packet frame A 4 byte CRC value used for error detection - Answer The frame check sequence of the Ethernet packet frame What is the minimum length of the Ethernet frame from destination MAC address through the frame check sequence? - Answer 64 bytes a device that relays the wireless signals from an access point or wireless router into areas with a weak signal or no signal at all - Answer range extender Where can range extenders be used to improve connectivity? - Answer Stores, warehouses, and public places using hotspots
Written for
- Institution
-
Western Governors University
- Course
-
WGU C172
Document information
- Uploaded on
- March 27, 2023
- Number of pages
- 15
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- wgu c172
- it is a network of use
-
answered 2023 wgu c172 network and security foundations pa and oa set completed
-
wgu c172 network and security foundations pa and oa
-
wgu c172 network and security
Also available in package deal