WGU C172 Pre- Assessment (Latest 2023/ 2024 Update) Network and Security Foundations| Questions and Verified Answers| 100% Correct| Grade A

WGU C172 Pre- Assessment (Latest 2023/

2024 Update) Network and Security

Foundations| Questions and Verified

Answers| 100% Correct| Grade A

Q: Which network diagnostic tool displays the path packets take between two endpoints?

Answer:

Traceroute

Q: Which network type is used to wire multiple PCs to a home router?

Answer:

LAN

Q: An office's infrastructure connects network devices and printers through a central access

point without the use of cabling.

Which network type does this office use?

Answer:

WLAN

Q: What type of medium is commonly used within a 1000 Mbps Ethernet network?

Answer:

CAT5e

Q: Which network topology is shown in the following diagram?

Answer:

Full mesh


Q: Which network topology is being implemented when each node connects to exactly two

other nodes, forming a single continuous pathway for signals through each node?

Answer:

Ring

Q: In which physical LAN topology are nodes connected to each other with a backbone cable

that loops around and ends at the same point it started?

Answer:

Ring

Q: Which cloud service provides hardware, operating systems, and web servers but not enduser applications?

Answer:

PaaS (Platform as a service)

Q: Which cloud model provides an exclusive cloud computing service envi- ronment that is

shared between two or more organizations?

Answer:

Community

Q: Which type of software is used to provide virtualization?

Answer:

Hypervisor


Q: Which OSI layer ensures error-free packets?

Answer:

Transport

Q: Which topology uses a switch or hub to connect to all devices in the same network?

Answer:

Star

Q: A user that does not want to be identified while communicating on a network uses an

application to alter the computer's identity.

Which type of exploit is being perpetrated?

Answer:

Spoofing

Q: An attacker attempts to misdirect traffic on a network back to the attacker by corrupting the

network computer's cache of IP address to MAC address mappings that are cached.

Which exploit is the attacker perpetrating?

Answer:

ARP poisoning

Q: Which exploit actually breaches the physical medium or uses devices to monitor signals

from outside the physical medium itself?

Answer:

Wiretapping

Q: Which type of attack can overwhelm a web server by inserting more data into a web form

than the system was configured to hold?


No comments found.
Login to post a comment
This item has not received any review yet.
Login to review this item
No Questions / Answers added yet.
Price $12.00
Add To Cart

Buy Now
Category Exams and Certifications
Comments 0
Rating
Sales 0

Buy Our Plan

We have

The latest updated Study Material Bundle with 100% Satisfaction guarantee

Visit Now
{{ userMessage }}
Processing