WGU C172 Network and Security Hypervisors and Cloud Computing Exam Review Questions and Answers updated 2024/2025
7 keer bekeken 0 keer verkocht
Vak
WGU C172 Network & Security
Instelling
WGU C172 Network & Security
WGU C172 Network and Security Hypervisors and Cloud Computing Exam Review Questions and Answers updated 2024/2025
PaaS (Platform as a Service) - correct answer A service that focuses on application development on any desired platform utilizing cloud computing
SaaS (Software as a Service) - co...
WGU C172 Network and Security Hypervisors
and Cloud Computing Exam Review Questions
and Answers updated 2024/2025
PaaS (Platform as a Service) - correct answer A service that focuses on application
development on any desired platform utilizing cloud computing
SaaS (Software as a Service) - correct answer A service that focuses on application
delivery
public cloud - correct answer cloud infrastructure operated by the cloud service
company but made available for general public use
private cloud - correct answer cloud infrastructure operated by the organization and
made available only to members of the organization
community cloud - correct answer cloud infrastructure that offers two or more
organizations exclusive access to the infrastructure and computing resources
hybrid cloud - correct answer cloud infrastructure that offers a combination of at least
one private cloud and one public cloud
SAN (storage area network) - correct answer a block-level data storage located across
a network; a typical enterprise storage solution
LUN (Logical Unit Number) - correct answer unique identifiers for a SAN;
IP addresses of the file servers
Fibre Channel (FC) - correct answer The original high-speed technology used to
connect data storage to servers;
uses fiber-optic cables to connect storage devices into a network
,IB (Infiniband) - correct answer A technology that provides high performance and high
throughput with low latency;
fastest storage interface, with speed of 200Gbps
FCoE (Fibre Channel over Ethernet) - correct answer A technology that
encapsulates Fibre Channel frames over Ethernet networks allowing FC to use 10Gbps
(or higher) Ethernet networks
while preserving the
FC protocol; jumbo frame supported
NAS (Network Attached Storage) - correct answer a file-level storage device that can
be accessed on a network;
available on FTP, NFS, AFP, SMB
Social Engineering - correct answer A process by which an intruder obtains enough
information from people to gain access to the network
Password Cracking - correct answer An attack in which the attacker tries to guess the
user's password
Dictionary Attack - correct answer An attack that uses known passwords and many
variations (upper- and lowercase and combinations) to try to log in to an account
Brute-Force Attack - correct answer An attack in which the attacker uses every
possible combination of characters to guess the password
Packet Sniffing - correct answer A technique in which the contents of data packets are
watched
,Man-in-the-Middle - correct answer An attack in which an attacker can seamlessly
place itself in the middle of a conversation between others in order to become the
recipient of all information sent by victim computers
ARP Cache Poisoning - correct answer An attack in which an attacker changes the
MAC addresses of the ARP cache, or "poisons the ARP cache" of victims to the MAC
address of the attacker so that conversations get redirected to the attacker
Evil Twin - correct answer A situation in which a rogue wireless access point poses as
a legitimate one by broadcasting a legitimate SSID and eavesdrops on the wireless
network
Session Hijacking - correct answer Exploiting web session control by stealing a
session cookie and using it to establish a session with a remote server that still thinks
the session is valid
Buffer Overflow - correct answer A situation that occurs when a program tries to put
more data into a buffer than it was configured to hold
nmap - correct answer A Linux and Windows port scanner
Penetration Testing - correct answer Evaluating the security of a user's network by
trying to exploit vulnerabilities
Virus - correct answer A piece of malicious computer code that, when opened, can
damage hardware, software, or other files
Worm - correct answer A type of virus that attacks computers, typically proliferates by
itself, and can deny service to networks
Malware (Malicious Software) - correct answer any program intended to harm, disrupt,
deny, or gain unauthorized access to a computing system
, Zero-Day Attack - correct answer An attack that exploits a software vulnerability that is
unknown to the developer
DoS (Denial of Service) - correct answer An attack in which service is denied to a
computer, network, or server
Spoof - correct answer To insert a different IP address in place of an IP packet's
source address to make it appear that a packet came from another network
Reflective/Amplified DoS Attack - correct answer An attack that uses spoofing to carry
out the attack and is a combination of a reflection attack and an amplification attack
Coordinated Attack - correct answer A type of distributed denial of service attack that is
deliberate toward a specific target and orchestrated by a controller source like the
command-and-control server in a botnet
botnet - correct answer a group of infected/compromised computers on the Internet
that are used to launch coordinated DoS attacks against another system on the network
NAQC (Network Access Quarantine Control) - correct answer Windows server
resource kit tool that allows admins to prevent remote clients from connecting to
network
Firewall - correct answer Hardware or software used to protect a computer network
Access Control List (ACL) - correct answer A basic form of firewall protection involving
a list of permissions attached to an object
access-list permit ip any any - correct answer The instruction added to the last line of
an access list to allow all other data packets to enter and exit the router
DMZ (Demilitarized Zone) - correct answer An area used to isolate servers
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
√ Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, Bancontact of creditcard voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper KieranKent55. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €12,63. Je zit daarna nergens aan vast.