Network and Security Foundations Practice Test (WGU C172) Study Guide Top-Rated 2024
37 vistas 1 veces vendidas
Grado
(WGU C172)
Institución
(WGU C172)
Two or more computers connected together over a wide geographical area (e.g. county, country, globe). What type of network is this? - WAN
Which of the following cloud computing solutions will deliver software applications to a client either over the internet or on a local area network? - SaaS
...
Network and Security Foundations Practice Test (WGU C172) Study Guide Top-Rated 2024 Two or more computers connected together over a wide geographical area (e.g. county, country, globe). What type of network is this? - WAN Which of the following cloud computing solutions will deliver software applications to a client either over the internet or on a local area network? - SaaS With regards to AAA, ________ defines what the user can access and in what manner. - Authorization What type of attack targets an SQL database using the input field of a user? - SQL injection Which network is this? I allow computers to communicate with each other in the same building - LAN Reports on a user's access and logs of successful and unsuccessful connection attempts are which part of AAA? - Accounting What should we be concerned with keeping up to date? - Office Suites, Browser Plugins, Anti -virus Barry is working with his organization's platforms team to select a virtualization approach for use in their data center. To provide stronger security, he would like to select a hypervisor that runs directly on bare metal hardware without an intervening ho st operating system. What type of hypervisor should he choose? - Type 1 You have implemented a network where each device provides all other devices on the network with access to shared files. What type of network do you have? - Peer -to-Peer Tom would like to determine what network ports are open on a newly commissioned server. Which one of the following tools is best suited for that task? - Nmap Which of the following geographic network types are typically contained within city or county limits? - Metropolitan Area Network (MAN) Which of the following threat actors seeks to defame, shed light on, or cripple an organization or government? - Black Hat Which of the following describes a man -in-the-middle attack? - A false server intercepts communications from a client by impersonating the intended server. Alice would like to send a message to Bob using an asymmetric cryptography algorithm. What key should she use to encrypt the message? - Bob's public key With regards to AAA, _______ confirms that the user is how he or she claims to be. - Authentication Which type of fiber cable is normally used to connect two buildings that are several miles apart? - Single -mode Which of the following are transport layer protocols? - TCP and UDP In what type of attack does the attacker attempt to send unauthorized commands to a back -end database through a web application? - SQL Injection Kyle is concerned that an attacker is probing his network and would like to use a decoy system to attract the attacker and analyze his or her activity. What type of tool would best meet Kyle's needs? - Honeypot In the OSI model, what is the primary function of the Network layer? - Routes data between networks James is working with his organization's platforms team to select a virtualization approach for use on test systems managed by developers. He is looking for a hypervisor that can run on top of the Windows operating system already installed on their laptops . What type of hypervisor is James looking for? - Type 2 You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use? - Circuit -level You were recently hired by a small start -up company. The company has no plans to setup their own datacenter. You have been asked to find a cloud service that would provide several physical servers or virtual machines that the company would be able to insta ll whatever operating systems and applications they need. Which cloud service model should you use? - Iaas A company is concerned with traffic that flows through the network. There is a concern that there may be malware that exists that is not being blocked or eradicated by antivirus. What technology can be put in place to detect potential malware traffic on th e network? - IDS A wireless deauthentication attack is an example of which type of attack: - Denial of Service Attack
Los beneficios de comprar resúmenes en Stuvia estan en línea:
Garantiza la calidad de los comentarios
Compradores de Stuvia evaluaron más de 700.000 resúmenes. Así estas seguro que compras los mejores documentos!
Compra fácil y rápido
Puedes pagar rápidamente y en una vez con iDeal, tarjeta de crédito o con tu crédito de Stuvia. Sin tener que hacerte miembro.
Enfócate en lo más importante
Tus compañeros escriben los resúmenes. Por eso tienes la seguridad que tienes un resumen actual y confiable.
Así llegas a la conclusión rapidamente!
Preguntas frecuentes
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
100% de satisfacción garantizada: ¿Cómo funciona?
Nuestra garantía de satisfacción le asegura que siempre encontrará un documento de estudio a tu medida. Tu rellenas un formulario y nuestro equipo de atención al cliente se encarga del resto.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller PossibleA. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for $13.99. You're not tied to anything after your purchase.