WGU C172 Network and Security Pre course Study Guide Exam Questions and Verified for Accuracy Answers 2024/2025
2 views 0 purchase
Course
WGU C172 Network & Security
Institution
WGU C172 Network & Security
WGU C172 Network and Security Pre course Study Guide Exam Questions and Verified for Accuracy Answers 2024/2025
Penetration testing - correct answer checking a network for vulnerabilities
Virus - correct answer malicious computer code that spreads into networks because of a user action but agai...
WGU C172 Network and Security Pre course
Study Guide Exam Questions and Verified for
Accuracy Answers 2024/2025
Penetration testing - correct answer checking a network for vulnerabilities
Virus - correct answer malicious computer code that spreads into networks because of
a user action but against the users will
Worm - correct answer a type of malicious code that can spread in a network without
user action
Malware - correct answer any malicious program
Zero day attack - correct answer an attack that has never been seen or documented,
and so lacks countermeasures or deterrents
D.D.o.S. - correct answer denial of service by disabling part of a server or other device
P.D.o.S. - correct answer Perment denial of service tries to permanently disable a
device
Spoof - correct answer insert fake information like a fake ip address to make it seem
like it came from someone else
NAQC - correct answer Network Access Quarantine Control
Firewall - correct answer Blocks some traffic from entering the network. Can be
hardware or software based.
ACL Access Control List - correct answer The Access Control List is a list of IP
addresses for the firewall to allow or block.
,Stateful - correct answer Firewall that keeps track of sessions and dynamically allows
of blocks traffic
IP Tunnel - correct answer IP packet encapsulated in another IP Packet
GRE - correct answer Generic Routing Encapsulation
PPP PAP - correct answer Point ot Point Protocall and Password Authentication
Protocol
CHAP - correct answer Challenge Handshake Authentication Protocol
MD5 & SHA - correct answer Hash functions used to provide secure file transfers. SSH
is more modern and safer.
Jamming - correct answer when someone overwhelms the network with traffic and
stops it from working
SSID - correct answer service set identifier that is used as a name for the router
Shared key authentication - correct answer both parties have the same encryption key
AES - correct answer advance encryption standard
War drive - correct answer attackers looking around for weak networks
,Smurf attack - correct answer ddos that Spoofs victims IP into large number of packets
Teardrop - correct answer ddos by sending fragmented packets that crash the system
because of a bug in TCP (transfer Control Protocol)
Ping of death - correct answer ddos where attacker uses ping command so send large
number of ping requests to disable the target
Bluejacking - correct answer Unsolicited messages are sent over Bluetooth
Core - correct answer processing unit
Cache - correct answer temporary storage memory
Virtualization - correct answer creating a virtual computer/machine or VM. Many virtual
computers can run on one physical computer.
Guest vs Host VM - correct answer The Host is the physical computer and the guest is
the VM (virtual Machine)
Hypervisor - correct answer software used to control the physical hardware as well as
the VM associated with it.
Type 1 vs 2 hypervisor - correct answer type 1 is loaded onto a server as a stand
alone solution. Type 2 is used on an existing OS (operating system)
VMM - correct answer virtual machine monitor
SLA - correct answer Service Level Agreement
, IAAS - correct answer Infrastructure as a Service provides access to remote hardware
and offers no software support.
Paas - correct answer platform as as service Focuses on cloud hosted application
development environments.
Saas - correct answer Software as a Service offers software over the internet
NAS - correct answer Network Attached Storage
T1 Cable - correct answer Transmits multiple channels over one 4 wire cord, typically
large and copper or fiber.
T3 Cable - correct answer has multiple T1 cables wrapped into one wire
Coaxial Cable - correct answer Uses multiple layers of wire and insulation for outdoor
or underwater use.
UTP Cable - correct answer Twisted pair of wires emits and accepts less
electromagnetic radiation
Fiber Optic Cable - correct answer
Patching - correct answer fixing bug is software or hardware to make it more secure or
stable.
P A T - correct answer P A T or Port Address Translation allows non rout-able networks
to access the internet
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller KieranKent55. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.99. You're not tied to anything after your purchase.