WGU C172 Pre- Assessment (Latest 2023/ 2024 Update) Network and Security Foundations| Questions and Verified Answers| 100% Correct| Grade A
WGU C172 Pre- Assessment (Latest 2023/
2024 Update) Network and Security
Foundations| Questions and Verified
Answers| 100% Correct| Grade A
Q: Which network diagnostic tool displays the path packets take between two endpoints?
Answer:
Traceroute
Q: Which network type is used to wire multiple PCs to a home router?
Answer:
LAN
Q: An office's infrastructure connects network devices and printers through a central access
point without the use of cabling.
Which network type does this office use?
Answer:
WLAN
Q: What type of medium is commonly used within a 1000 Mbps Ethernet network?
Answer:
CAT5e
Q: Which network topology is shown in the following diagram?
Answer:
Full mesh
Q: Which network topology is being implemented when each node connects to exactly two
other nodes, forming a single continuous pathway for signals through each node?
Answer:
Ring
Q: In which physical LAN topology are nodes connected to each other with a backbone cable
that loops around and ends at the same point it started?
Answer:
Ring
Q: Which cloud service provides hardware, operating systems, and web servers but not enduser applications?
Answer:
PaaS (Platform as a service)
Q: Which cloud model provides an exclusive cloud computing service envi- ronment that is
shared between two or more organizations?
Answer:
Community
Q: Which type of software is used to provide virtualization?
Answer:
Hypervisor
Q: Which OSI layer ensures error-free packets?
Answer:
Transport
Q: Which topology uses a switch or hub to connect to all devices in the same network?
Answer:
Star
Q: A user that does not want to be identified while communicating on a network uses an
application to alter the computer's identity.
Which type of exploit is being perpetrated?
Answer:
Spoofing
Q: An attacker attempts to misdirect traffic on a network back to the attacker by corrupting the
network computer's cache of IP address to MAC address mappings that are cached.
Which exploit is the attacker perpetrating?
Answer:
ARP poisoning
Q: Which exploit actually breaches the physical medium or uses devices to monitor signals
from outside the physical medium itself?
Answer:
Wiretapping
Q: Which type of attack can overwhelm a web server by inserting more data into a web form
than the system was configured to hold?
Category | Exams and Certifications |
Comments | 0 |
Rating | |
Sales | 0 |