WGU C172 Pre- Assessment (Latest 2023/ 2024 Update) Network and Security Foundations| Questions and Verified Answers| 100% Correct| Grade A

WGU C172 Pre- Assessment (Latest 2023/

2024 Update) Network and Security

Foundations| Questions and Verified

Answers| 100% Correct| Grade A

Q: Which network diagnostic tool displays the path packets take between two endpoints?

Answer:

Traceroute

Q: Which network type is used to wire multiple PCs to a home router?

Answer:

LAN

Q: An office's infrastructure connects network devices and printers through a central access

point without the use of cabling.

Which network type does this office use?

Answer:

WLAN

Q: What type of medium is commonly used within a 1000 Mbps Ethernet network?

Answer:

CAT5e

Q: Which network topology is shown in the following diagram?

Answer:

Full mesh


Q: Which network topology is being implemented when each node connects to exactly two

other nodes, forming a single continuous pathway for signals through each node?

Answer:

Ring

Q: In which physical LAN topology are nodes connected to each other with a backbone cable

that loops around and ends at the same point it started?

Answer:

Ring

Q: Which cloud service provides hardware, operating systems, and web servers but not enduser applications?

Answer:

PaaS (Platform as a service)

Q: Which cloud model provides an exclusive cloud computing service envi- ronment that is

shared between two or more organizations?

Answer:

Community

Q: Which type of software is used to provide virtualization?

Answer:

Hypervisor


Q: Which OSI layer ensures error-free packets?

Answer:

Transport

Q: Which topology uses a switch or hub to connect to all devices in the same network?

Answer:

Star

Q: A user that does not want to be identified while communicating on a network uses an

application to alter the computer's identity.

Which type of exploit is being perpetrated?

Answer:

Spoofing

Q: An attacker attempts to misdirect traffic on a network back to the attacker by corrupting the

network computer's cache of IP address to MAC address mappings that are cached.

Which exploit is the attacker perpetrating?

Answer:

ARP poisoning

Q: Which exploit actually breaches the physical medium or uses devices to monitor signals

from outside the physical medium itself?

Answer:

Wiretapping

Q: Which type of attack can overwhelm a web server by inserting more data into a web form

than the system was configured to hold?


No comments found.
Login to post a comment

jordancarter 7 months ago

This study guide is clear, well-organized, and covers all the essential topics. The explanations are concise, making complex concepts easier to understand. It could benefit from more practice questions, but overall, it's a great resource for efficient studying. Highly recommend!
Login to review this item
Q. What will I receive when I purchase this document?
A. You will receive a PDF that is available for instant download upon purchase. The document will be accessible to you at any time, from anywhere, and will remain available indefinitely through your profile.
Q. Satisfaction guarantee: how does it work?
A. Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Q. Who am I buying these notes from?
A. you are buying this document from us learnexams
Q. Will I be stuck with a subscription?
A. No, you only buy these notes for $ indicated . You are not obligated to anything after your purchase.
Q. Can learnexams be trusted?
A. check our reviews at trustpilot
Price $12.00
Add To Cart

Buy Now
Category Exams and Certifications
Comments 0
Rating
Sales 0

Buy Our Plan

We have

The latest updated Study Material Bundle with 100% Satisfaction guarantee

Visit Now
{{ userMessage }}
Processing