Network and Security Foundations Practice Test (WGU C172) Study Guide Top-Rated 2024
37 keer bekeken 1 keer verkocht
Vak
(WGU C172)
Instelling
(WGU C172)
Two or more computers connected together over a wide geographical area (e.g. county, country, globe). What type of network is this? - WAN
Which of the following cloud computing solutions will deliver software applications to a client either over the internet or on a local area network? - SaaS
...
Network and Security Foundations Practice Test (WGU C172) Study Guide Top-Rated 2024 Two or more computers connected together over a wide geographical area (e.g. county, country, globe). What type of network is this? - WAN Which of the following cloud computing solutions will deliver software applications to a client either over the internet or on a local area network? - SaaS With regards to AAA, ________ defines what the user can access and in what manner. - Authorization What type of attack targets an SQL database using the input field of a user? - SQL injection Which network is this? I allow computers to communicate with each other in the same building - LAN Reports on a user's access and logs of successful and unsuccessful connection attempts are which part of AAA? - Accounting What should we be concerned with keeping up to date? - Office Suites, Browser Plugins, Anti -virus Barry is working with his organization's platforms team to select a virtualization approach for use in their data center. To provide stronger security, he would like to select a hypervisor that runs directly on bare metal hardware without an intervening ho st operating system. What type of hypervisor should he choose? - Type 1 You have implemented a network where each device provides all other devices on the network with access to shared files. What type of network do you have? - Peer -to-Peer Tom would like to determine what network ports are open on a newly commissioned server. Which one of the following tools is best suited for that task? - Nmap Which of the following geographic network types are typically contained within city or county limits? - Metropolitan Area Network (MAN) Which of the following threat actors seeks to defame, shed light on, or cripple an organization or government? - Black Hat Which of the following describes a man -in-the-middle attack? - A false server intercepts communications from a client by impersonating the intended server. Alice would like to send a message to Bob using an asymmetric cryptography algorithm. What key should she use to encrypt the message? - Bob's public key With regards to AAA, _______ confirms that the user is how he or she claims to be. - Authentication Which type of fiber cable is normally used to connect two buildings that are several miles apart? - Single -mode Which of the following are transport layer protocols? - TCP and UDP In what type of attack does the attacker attempt to send unauthorized commands to a back -end database through a web application? - SQL Injection Kyle is concerned that an attacker is probing his network and would like to use a decoy system to attract the attacker and analyze his or her activity. What type of tool would best meet Kyle's needs? - Honeypot In the OSI model, what is the primary function of the Network layer? - Routes data between networks James is working with his organization's platforms team to select a virtualization approach for use on test systems managed by developers. He is looking for a hypervisor that can run on top of the Windows operating system already installed on their laptops . What type of hypervisor is James looking for? - Type 2 You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use? - Circuit -level You were recently hired by a small start -up company. The company has no plans to setup their own datacenter. You have been asked to find a cloud service that would provide several physical servers or virtual machines that the company would be able to insta ll whatever operating systems and applications they need. Which cloud service model should you use? - Iaas A company is concerned with traffic that flows through the network. There is a concern that there may be malware that exists that is not being blocked or eradicated by antivirus. What technology can be put in place to detect potential malware traffic on th e network? - IDS A wireless deauthentication attack is an example of which type of attack: - Denial of Service Attack
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
√ Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, Bancontact of creditcard voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper PossibleA. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €13,61. Je zit daarna nergens aan vast.