Voordeelbundel
WGU C172 Bundled Exams with Complete Solution | Verified | Everything you Need!!
WGU C172 Bundled Exams with Complete Solution | Verified | Everything you Need!!
[Meer zien]WGU C172 Bundled Exams with Complete Solution | Verified | Everything you Need!!
[Meer zien]Which OSI layer is related to the function of the IP protocol suite? 
Network 
Which OSI layer is responsible for organizing how bits are passed over the physical layer between devices 
within the same collision domain? 
Data link 
Which OSI layer would define the scope of a protocol that makes sure...
Voorbeeld 2 van de 7 pagina's
In winkelwagenWhich OSI layer is related to the function of the IP protocol suite? 
Network 
Which OSI layer is responsible for organizing how bits are passed over the physical layer between devices 
within the same collision domain? 
Data link 
Which OSI layer would define the scope of a protocol that makes sure...
Two or more computers connected together over a wide geographical area (e.g. county, country, globe). 
What type of network is this? - -WAN 
Which of the following cloud computing solutions will deliver software applications to a client either 
over the internet or on a local area network? - -SaaS 
...
Voorbeeld 2 van de 6 pagina's
In winkelwagenTwo or more computers connected together over a wide geographical area (e.g. county, country, globe). 
What type of network is this? - -WAN 
Which of the following cloud computing solutions will deliver software applications to a client either 
over the internet or on a local area network? - -SaaS 
...
802.11a/Wireless-A - -wireless 5GHz - 54Mbps - *75ft* 
802.11b/Wireless-B - -wireless 2.4GHz - *11Mbps* - 100-150ft 
802.11g/Wireless-G - -2.4GHz - *54Mbps - 150ft* 
802.11ac/Wireless-AC - -5GHz - *1.3Gbps* 
802.11n/Wireless-N - -2.4GHz - *200+Mbps* 
2.4GHz - -Frequency ranges of 802.11G/802.11B 
5G...
Voorbeeld 1 van de 4 pagina's
In winkelwagen802.11a/Wireless-A - -wireless 5GHz - 54Mbps - *75ft* 
802.11b/Wireless-B - -wireless 2.4GHz - *11Mbps* - 100-150ft 
802.11g/Wireless-G - -2.4GHz - *54Mbps - 150ft* 
802.11ac/Wireless-AC - -5GHz - *1.3Gbps* 
802.11n/Wireless-N - -2.4GHz - *200+Mbps* 
2.4GHz - -Frequency ranges of 802.11G/802.11B 
5G...
Application Layer - -Interacts with application programs that incorporate a communication 
component such as your internet browser and email. 
Bus Topology - -The computers share the media (coaxial cable) for data transmission. 
Cable Modem - -A modem that can use the high bandwidth of a cable telev...
Voorbeeld 4 van de 52 pagina's
In winkelwagenApplication Layer - -Interacts with application programs that incorporate a communication 
component such as your internet browser and email. 
Bus Topology - -The computers share the media (coaxial cable) for data transmission. 
Cable Modem - -A modem that can use the high bandwidth of a cable telev...
Which OSI layer is related to the function of the IP protocol suite? - -Network 
Which OSI layer is responsible for organizing how bits are passed over the physical layer between devices 
within the same collision domain? - -Data link 
Which OSI layer would define the scope of a protocol that makes ...
Voorbeeld 1 van de 3 pagina's
In winkelwagenWhich OSI layer is related to the function of the IP protocol suite? - -Network 
Which OSI layer is responsible for organizing how bits are passed over the physical layer between devices 
within the same collision domain? - -Data link 
Which OSI layer would define the scope of a protocol that makes ...
Site surveys obtain the following information. (Choose all that apply.) 
Electrical power 
Supported bandwidth 
Connection points to the main network. 
RF coverage - -Electrical power 
Supported bandwidth 
Connection points to the main network. 
RF coverage 
MIMO uses wave division multiplexing. 
Fa...
Voorbeeld 3 van de 29 pagina's
In winkelwagenSite surveys obtain the following information. (Choose all that apply.) 
Electrical power 
Supported bandwidth 
Connection points to the main network. 
RF coverage - -Electrical power 
Supported bandwidth 
Connection points to the main network. 
RF coverage 
MIMO uses wave division multiplexing. 
Fa...
Chp. 7 
What are the two ways 802.11 supports authenticating clients? - -open and shared key 
Chp. 7 
What does RADIUS do? - -RADIUS is used to provide authentication and prevent unauthorized users 
from connecting to the network. 
Chp. 7 
What does RADIUS stand for? - -Remote Authentication Dial-In...
Voorbeeld 2 van de 7 pagina's
In winkelwagenChp. 7 
What are the two ways 802.11 supports authenticating clients? - -open and shared key 
Chp. 7 
What does RADIUS do? - -RADIUS is used to provide authentication and prevent unauthorized users 
from connecting to the network. 
Chp. 7 
What does RADIUS stand for? - -Remote Authentication Dial-In...
Which type of Ethernet cable can maintain 10Gbps transmission speeds through the course of its 
maximum 100-meter length? - -CAT 6a 
Which Internet access technology uses ordinary telephone wires for data transmission? - -DSL 
Which device is used to organize network cables as they run between switc...
Voorbeeld 2 van de 10 pagina's
In winkelwagenWhich type of Ethernet cable can maintain 10Gbps transmission speeds through the course of its 
maximum 100-meter length? - -CAT 6a 
Which Internet access technology uses ordinary telephone wires for data transmission? - -DSL 
Which device is used to organize network cables as they run between switc...
What is an example of a networking attack? 
Having insecure passwords that a hacker runs a dictionary based attack against. 
What is an example of a social engineering attack? 
Receiving an bad email (phishing). Happen because humans don't see it coming. 
What is an APT? 
Advanced Persistent Threat...
Voorbeeld 2 van de 6 pagina's
In winkelwagenWhat is an example of a networking attack? 
Having insecure passwords that a hacker runs a dictionary based attack against. 
What is an example of a social engineering attack? 
Receiving an bad email (phishing). Happen because humans don't see it coming. 
What is an APT? 
Advanced Persistent Threat...
Social Engineering - -The first issue of intrusion is ____. 
Tunneling - -Which of the following allows a secure communication between a private network and a 
public network, such as the Internet? 
DoS Attack - -Which of the following security attacks occurs when an attacker sends the target 
syste...
Voorbeeld 1 van de 2 pagina's
In winkelwagenSocial Engineering - -The first issue of intrusion is ____. 
Tunneling - -Which of the following allows a secure communication between a private network and a 
public network, such as the Internet? 
DoS Attack - -Which of the following security attacks occurs when an attacker sends the target 
syste...
Social Engineering - -This is a way for an intruder to gain enough information from people to gain 
access to the network. As an example, an attacker calls a user on a network and claims he is from the 
computer support division of the network. The attacker tells the user that there is a problem wit...
Voorbeeld 2 van de 6 pagina's
In winkelwagenSocial Engineering - -This is a way for an intruder to gain enough information from people to gain 
access to the network. As an example, an attacker calls a user on a network and claims he is from the 
computer support division of the network. The attacker tells the user that there is a problem wit...
OSI Layer 1 - Physical - -Physical Layer: This layer is responsible for the physical connections of the 
devices in the network. This layer is implemented through the use of devices such as hubs, repeaters, 
modem devices, and physical cabling. 
OSI Layer 2 - Data Link - -Data Link Layer: This layer...
Voorbeeld 2 van de 7 pagina's
In winkelwagenOSI Layer 1 - Physical - -Physical Layer: This layer is responsible for the physical connections of the 
devices in the network. This layer is implemented through the use of devices such as hubs, repeaters, 
modem devices, and physical cabling. 
OSI Layer 2 - Data Link - -Data Link Layer: This layer...
OSI Model Layer 1 - -Physical 
The Physical layer represents the physical medium that connects the computers together. 
OSI Model Layer 2 - -Data Link 
represents how computers logically connect to the network. Protocols at Layer 2 define how computers 
can share access to a common medium, such as a...
Voorbeeld 2 van de 9 pagina's
In winkelwagenOSI Model Layer 1 - -Physical 
The Physical layer represents the physical medium that connects the computers together. 
OSI Model Layer 2 - -Data Link 
represents how computers logically connect to the network. Protocols at Layer 2 define how computers 
can share access to a common medium, such as a...
Asset - -A person, device, location, or information that SecOps aims to protect from attack. 
Attack - -An action taken by a threat that exploits a vulnerability that attempts to either block 
authorized access to an asset, or to gain unauthorized access to an asset. 
Risk - -The potential of a thre...
Voorbeeld 2 van de 11 pagina's
In winkelwagenAsset - -A person, device, location, or information that SecOps aims to protect from attack. 
Attack - -An action taken by a threat that exploits a vulnerability that attempts to either block 
authorized access to an asset, or to gain unauthorized access to an asset. 
Risk - -The potential of a thre...
Which of the following are advantages of optical communication links? - -1. Security 
2. Extremely wide bandwidth 
3. Elimination of crosstalk 
What is the "two deep" rule relative to optical networking? - -This means that a building should only 
have the main distribution and the intermediate dis...
Voorbeeld 1 van de 2 pagina's
In winkelwagenWhich of the following are advantages of optical communication links? - -1. Security 
2. Extremely wide bandwidth 
3. Elimination of crosstalk 
What is the "two deep" rule relative to optical networking? - -This means that a building should only 
have the main distribution and the intermediate dis...
In TCP/IP model,____layer processes requests from hosts to ensure a connection is made to the 
appropriate port - -application 
The binary value for the decimal number 49 is - - 
Decimal equivalent of is - -37 
Decimal equivalent of is - -170 
Decimal equivalent of is - -240 
Binary equivalent of...
Voorbeeld 1 van de 3 pagina's
In winkelwagenIn TCP/IP model,____layer processes requests from hosts to ensure a connection is made to the 
appropriate port - -application 
The binary value for the decimal number 49 is - - 
Decimal equivalent of is - -37 
Decimal equivalent of is - -170 
Decimal equivalent of is - -240 
Binary equivalent of...
TCP/IP - -Known as Transmission Control Protocol/internet protocol and is a set of protocols used to 
connect network devices to each other 
Application Layer (TCP/IP) - -TCP/IP layer that is responsible for the communication protocols 
between nodes, such as HTTP, SSH, and NTP 
Transport Layer (TCP...
Voorbeeld 2 van de 11 pagina's
In winkelwagenTCP/IP - -Known as Transmission Control Protocol/internet protocol and is a set of protocols used to 
connect network devices to each other 
Application Layer (TCP/IP) - -TCP/IP layer that is responsible for the communication protocols 
between nodes, such as HTTP, SSH, and NTP 
Transport Layer (TCP...
A very popular intrusion approach thanks to its success rate is what? - -Social Engineering 
The physical architecture of a computer network is known as its ____. - -Topologies 
The 802.11 wireless LAN uses what in order to identify the wireless traffic that is permitted to connect? - 
-SSID 
PING u...
Voorbeeld 2 van de 5 pagina's
In winkelwagenA very popular intrusion approach thanks to its success rate is what? - -Social Engineering 
The physical architecture of a computer network is known as its ____. - -Topologies 
The 802.11 wireless LAN uses what in order to identify the wireless traffic that is permitted to connect? - 
-SSID 
PING u...
Which OSI(Open Systems Interconnection model) layer is related to the function of the IP protocol 
suite? 
Network 
Which OSI(Open Systems Interconnection model) layer is responsible for organizing how bits are passed 
over the physical layer between devices within the same collision domain? 
Data l...
Voorbeeld 2 van de 8 pagina's
In winkelwagenWhich OSI(Open Systems Interconnection model) layer is related to the function of the IP protocol 
suite? 
Network 
Which OSI(Open Systems Interconnection model) layer is responsible for organizing how bits are passed 
over the physical layer between devices within the same collision domain? 
Data l...
TCP/IP (Transmission Control Protocol/Internet Protocol) - -A set of protocols made up of four layers 
(Application, Transport, Network, Network Interface Layer) used to connect network devices to each 
other 
Network Interface Layer (TCP/IP) - -TCP/IP model layer that establishes how data should be...
Voorbeeld 3 van de 19 pagina's
In winkelwagenTCP/IP (Transmission Control Protocol/Internet Protocol) - -A set of protocols made up of four layers 
(Application, Transport, Network, Network Interface Layer) used to connect network devices to each 
other 
Network Interface Layer (TCP/IP) - -TCP/IP model layer that establishes how data should be...
It is a network of users that share computer resources in a limited area. - -LAN 
Local Area Network - -LAN 
How are Local Area Networks defined? - -In terms of protocol and the topology used for accessing 
the network. 
A set of rules established for users to exchange information - -Protocol 
The n...
Voorbeeld 4 van de 32 pagina's
In winkelwagenIt is a network of users that share computer resources in a limited area. - -LAN 
Local Area Network - -LAN 
How are Local Area Networks defined? - -In terms of protocol and the topology used for accessing 
the network. 
A set of rules established for users to exchange information - -Protocol 
The n...
What is the subnet address for a packet that is sent to 174.118.17.95 with a subnet mask of 
255.255.248.0? - -174.118.16.0 
With an address of 197.15.22.31 and a subnet mask of 255.255.255.224, how many bits have been 
borrowed to create a subnet? - -3 
Which 802.11 technologies use the 2.4Ghz spec...
Voorbeeld 1 van de 3 pagina's
In winkelwagenWhat is the subnet address for a packet that is sent to 174.118.17.95 with a subnet mask of 
255.255.248.0? - -174.118.16.0 
With an address of 197.15.22.31 and a subnet mask of 255.255.255.224, how many bits have been 
borrowed to create a subnet? - -3 
Which 802.11 technologies use the 2.4Ghz spec...
Firewall - -A part of a computer system or network designed to block unauthorized access while 
permitting outward communication. 
Stateful Inspection Firewall - -The inbound and outbound data packets are compared to determine if 
a connection should be allowed. 
Proxy Server - -The client gets acce...
Voorbeeld 1 van de 4 pagina's
In winkelwagenFirewall - -A part of a computer system or network designed to block unauthorized access while 
permitting outward communication. 
Stateful Inspection Firewall - -The inbound and outbound data packets are compared to determine if 
a connection should be allowed. 
Proxy Server - -The client gets acce...
Traceroute - -Used to determine the number of hops required for a packet to reach its destination. 
Nslookup - -Used to determine IP address of a domain name. 
Ping - -Used to determine the IP address and latency in networks. 
Netstat -a - -Used to display IP ports currently open on the Windows OS. ...
Voorbeeld 1 van de 2 pagina's
In winkelwagenTraceroute - -Used to determine the number of hops required for a packet to reach its destination. 
Nslookup - -Used to determine IP address of a domain name. 
Ping - -Used to determine the IP address and latency in networks. 
Netstat -a - -Used to display IP ports currently open on the Windows OS. ...
Application Layer(7th layer) - -Interacts with application programs that incorporate a communication 
component such as your internet browser and email (provides user interface) 
Bus Topology - -The computers share the media (coaxial cable) for data transmission 
CAT6 (category 6) - -Twisted-pair ca...
Voorbeeld 3 van de 29 pagina's
In winkelwagenApplication Layer(7th layer) - -Interacts with application programs that incorporate a communication 
component such as your internet browser and email (provides user interface) 
Bus Topology - -The computers share the media (coaxial cable) for data transmission 
CAT6 (category 6) - -Twisted-pair ca...
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Preach. Stuvia faciliteert de betaling aan de verkoper.
Nee, je koopt alleen deze samenvatting voor $40.49. Je zit daarna nergens aan vast.
4,6 sterren op Google & Trustpilot (+1000 reviews)
Afgelopen 30 dagen zijn er 87637 samenvattingen verkocht
Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen