WGU C172 Final Exam (Latest 2023/ 2024 Update) Network and Security Foundations| Questions and Verified Answers| 100% Correct| Grade A

WGU C172 Final Exam (Latest 2023/ 2024 Update) Network and Security Foundations| Questions and Verified Answers| 100% Correct| Grade A

WGU C172 Final Exam (Latest 2023/ 2024
Update) Network and Security Foundations|
Questions and Verified Answers| 100%
Correct| Grade A
Q: Topology whereas each device is connected to a switch or hub
Answer:
Star
Q: A switch or hub facilitates the transfer of data between networking devices in this topology
Answer:
star
Q: Transmits data to all the devices connected in the star network
Answer:
hub
Q: Also called a multiport repeater
Answer:
hub
Q: Not meant for large networks, but are still used in some smaller, slower speed LANs

Answer:
hub
Q: A transmission from a hub in a star network to all the devices in the network connected to
the hub
Answer:
broadcast
Q: Stores the hardware or physical address for each device connected to its ports in a star
network
Answer:
switch
Q: Sends data transmissions directly to the port of the destination device on the network
Answer:
switch
Q: The physical input/output interfaces to the networking hardware
Answer:
port
Q: Where the cables physically connect to each other or a central switch or hub
Answer:
Port

Q: Only the intended destination device on this network will see the data traffic
Answer:
star
Q: What is an advantage of the star topology?
Answer:
It improves the efficiency of the available bandwidth of the network
Q: What is an advantage of the star topology from the troubleshooting and maintenance?
Answer:
A device can be removed or added without disrupting other devices on the network
Q: All devices are connected to each other
Answer:
mesh topology
Q: What is an advantage of the mesh network?
Answer:
It provides full redundancy in the network data paths
Q: What is a disadvantage of the mesh network?

Answer:
The additional data paths increase the cabling cost and the network hardware cost. It is also very
complex.
Q: What type of applications is the mesh topology suited for?
Answer:
high-reliability applications
Q: What type of applications is the mesh topology not suited for?
Answer:
general networking applications
Q: Open systems interconnect reference model
Answer:
OSI
Q: Who was the OSI model developed by?
Answer:
The International Organization for Standardization
Q: What year was the OSI model developed?
Answer:
1984
Powered by https://learnexams.com/search/study?query=

LAN
It is a network of users that share computer resources in a limited area.

LAN
Local Area Network

In terms of protocol and the topology used for accessing the network.
How are Local Area Networks defined?

Protocol
A set of rules established for users to exchange information

Topology
The network architecture used to interconnect the networking equipment.

Ring, Bus, and Star
What are the most common topologies for LANs?

Token Ring topology
Uses a token that is placed in the data channel and circulates around the ring.

Token Ring Topology
A deterministic network

Deterministic
Each station connected to the network ensures access for transmission of its messages at regular or fixed time intervals

  1. If an error changes the token pattern, it can cause the token to stop circulating.
    What are the disadvantages of the Token Ring system?

The token ring path must be temporarily broken or interrupted if a computer or any device on the network is to be removed or added to the network.
What is a disadvantage of the Token Ring system from the troubleshooting and maintenance?

Connect each computer or device on the network to a central token ring hub.
What is a solution to the troubleshooting and maintenance disadvantages of the Token Ring system?

Token ring hub
A device that manages the passing of the token instead of relying on individual computers to pass it.

It improves the reliability of the network.
How does the token ring hub improve the network?

Bus topology
Topology whereas the computers share the media or coaxial cable for data transmission.

ThinNet
The coaxial cable that is looped through each networking device to transmit data in a bus topology

Bus topology
In this topology, all devices on the network can see each other’s data traffic.

Bus topology
Topology whereas each computer must wait for pauses in transmission or until the transmission from one device is complete before initiating a new transmission onto the network.

“1. Data can be corrupted if ore than one device on the network transmits at the same time and will have to be resubmitted.

  1. The use of the shared coaxial cable prevents data transmission from being very bandwidth-efficient.”
    What are the disadvantages of a bus topology?

Bus topology
Which topology is seldomly used in modern networks?

Star topology
What is the most common topology used in today’s LANs?

Star topology
Topology that uses twisted-pair cables with modular plugs to connect computers and other networking devices.

Star
Topology whereas each device is connected to a switch or hub

star
A switch or hub facilitates the transfer of data between networking devices in this topology

hub
Transmits data to all the devices connected in the star network

hub
Also called a multiport repeater

hub
Not meant for large networks, but are still used in some smaller, slower speed LANs

broadcast
A transmission from a hub in a star network to all the devices in the network connected to the hub

switch
Stores the hardware or physical address for each device connected to its ports in a star network

switch
Sends data transmissions directly to the port of the destination device on the network

port
The physical input/output interfaces to the networking hardware

Port
Where the cables physically connect to each other or a central switch or hub

star
Only the intended destination device on this network will see the data traffic

It improves the efficiency of the available bandwidth of the network
What is an advantage of the star topology?

A device can be removed or added without disrupting other devices on the network
What is an advantage of the star topology from the troubleshooting and maintenance?

mesh topology
All devices are connected to each other

It provides full redundancy in the network data paths
What is an advantage of the mesh network?

The additional data paths increase the cabling cost and the network hardware cost. It is also very complex.
What is a disadvantage of the mesh network?

high-reliability applications
What type of applications is the mesh topology suited for?

general networking applications
What type of applications is the mesh topology not suited for?

OSI
Open systems interconnect reference model

The International Organization for Standardization
Who was the OSI model developed by?

1984
What year was the OSI model developed?

to enable different types of networks to be linked together
What is the purpose of the OSI model?

To provide a framework for networking devices that ensure compatibility in the network hardware and software.
What is OSI meant for?

The development of new networking technologies.
What is the OSI model meant to accelerate?

Physical
What is layer 1 of the OSI model?

physical
The layer of the OSI model that provides the electrical and mechanical connection to the network.

physicaL
UTP, fiber, and network interface cards are examples of which layer of the OSI model?

Data link
What is layer 2 of the OSI model?

data link
Layer of the OSI model that handles error recovery, flow control (synchronization), and sequencing (which terminals are sending and which are receiving)

data Link
Also called the media access control layer

data lInk
The layer of the OSI model where the Media Access Control or MAC, addressing is defined

In the MAC or media access control
Where is the Ethernet 802.3 standard defined?

MAC or media access control
Also called the Ethernet address

data linK
MAC addresses are an example of which layer of the OSI model?

Network
What is layer 3 of the OSI model?

network
layer of the OSI model that accepts outgoing messages and combines messages or segments into packets, adding a header that includes routing information.

network layer of the OSI model
Acts as the network controller

networK
Internet Protocol (IP) and internetwork packet exchange (IPX) are examples of which layer of the OSI model?

Transport
What is layer 4 of the OSI model?

transport
layer of the OSI model that is concerned with message integrity between source and destination

tRansport
layer of the osi model that also segments/reassembles the packes and handles flow control

transporT
Transmission control protocol (TCP) and User Datagram Protocol are examples of which layer of the OSI model?

Session
What is layer 5 of the osi model?

session
layer of the osi model that provides the control functions necessary to establish, manage, and terminate the connections as required to satisfy the user request

sessioN
Network File system (NFS) and Structured Query Language (SQL) are examples of which osi model layer?

Presentation
What is layer 6 of the osi model?

presentation
layer of the osi model that accepts and structures the messages for the application. If necessary, it will translate one code to another

pResentation
layer of the osi model that is also responsible for data compression and encryption

presentatioN
American Standard Code for Information Interchange (ASCII) and Joint Photographic Experts Group (JPEG) are examples of which layer of the OSI model?

Application
What is layer 7 of the osi model?

application
layer of the osi model that interacts with application programs that incorporate a communication component such as your internet browser and email

aPplication
layer of the osi model that is also responsible for logging the message in, interpreting the request, and determining what information is needed to support the request

applicatioN
Hypertext Transfer Protocol (HTTP) for web browsing, File Transfer Protocol (FTP) for transferring files, and Simple Mail Transfer Protocol (SMTP) for email transmission are examples of which osi model layer?

Is the connection to the machine down (layer 1)
What is step one of the three basic steps in the process of isolating a network problem?

Is the network down? layer 3
What is step two of the three basic steps in the process of isolating a network problem?

Is a service on a specific machine down? layer 7
What is step three of the three basic steps in the process of isolating a network problem?

A connection to the server is up
A reply from” response from a ping indicates whate?”

the network connection is down
A request timed out” response from a ping indicates what?”

to provide for the flow of data MAC addresses
What is the function of the data link layer of the osi model?

to provide routing decisions IP, IPX
What is the function of the network layer?

to ensure error free packets
What is the function of the transport layer of the osi model?

to establish, manage, and terminate NFS, SQL sessions
What is the function of the session layer of the osi model?

to ensure protocol conversion, data transactions ASCII, JPEG
What is the function of the presentation layer of the osi model?

to support applications HTTP, FTP, and SMTP(email)
What is function of the application layer of the osi model?

Ethernet
Which networking protocol is used in most modern computer networks?

Ethernet
A carrier sense multiple access with collision detection protocol for local area networks

Ethernet systems
Must have the capability to detect data collisions (collision detection) to avoid two or more computers from attempting to broadcast a message at the same time.

packet
Provide grouping of information for transmission

The preamble, start frame delimiter, destination and source addresses, and length/type field
What does the header of a packet consist of?

The structure of the Ethernet frame
Preamble, start frame delimiter, destination mac address, source address, length/type, data, pad, and frame check sequence.

The preamble of an Ethernet packet
An alternating pattern of 1s and 0s used for synchronization

The start frame delimiter of an Ethernet packet
A binary 8 bit sequence of 10101011 that indicates the start of the frame

The destination and source MAC addresses of an Ethernet packet
The MAC address associated with the network adapter or Ethernet network interface card (NIC)

The length/type of the Ethernet packet frame
An indication of the number of bytes in the data field if this value is less than 1500, or if the number is greater than 1500, and indication of the type of data format such as IP and IPX

The data of the Ethernet packet frame
The variable length of data being transferred from the source to the destiontion

The pad of the Ethernet packet frame
A field used to bring the total number of bytes up to the minimum of 46 if the data field is less than 46 bytes

The frame check sequence of the Ethernet packet frame
A 4 byte CRC value used for error detection

64 bytes
What is the minimum length of the Ethernet frame from destination MAC address through the frame check sequence?

range extender
a device that relays the wireless signals from an access point or wireless router into areas with a weak signal or no signal at all

Stores, warehouses, and public places using hotspots
Where can range extenders be used to improve connectivity?

hot spot
a limited geopgraphic area that provides wireless access for the public

“1. Change the default factory password

  1. Change the default SSID
  2. Turn encryption on
  3. Turn off the SSID broadcast
  4. Enable MAC address filtering”
    What basic steps can help secure a wireless home network?

using a combination of alphanumeric characters
How should a default password on a wireless device be reset?

SSID
the name used to identify your network and is used by your access point or wireless router to establish an association

SSID
Service Set Identifier

32
How many characters can the SSID be?

prevents the wireless system from broadcasting SSID
What does the turning off the SSID broadcast of your access point or wireless router in your wireless home network do?

only wireless devices that have specific MAC addresses will be allowed access to the network
What happens when MAC addressing filtering is turned on?

“1.Network address translation

  1. Firewall protection
  2. establishing a VPN connection when transferring sensitive information”
    What are ways of protecting your home network from outside threats?

Only the router IP address
What does a network address translation allow the outsider to see?

because the ip addresses of the internal networking devices are not provided on the Internet
Why does the network address translation allow the outsider to only see the router IP address?

a firewall
Prevents unauthorized access to your network

state packet inspection (SPI)
a type of firewall that inspects incoming data packets to make sure they correspond to an outgoing request

VPN
a virtual private network that establishes a secure network connection

VPN connection
type of connection that is encrypted

Network Address Translation (NAT)
a technique that translates the private IP address of a computer to a public address for routing over the Internet

Overloading
a technique used by a router, where NAT translates the home’s network’s private IP addresses to the single public IP address assigned by the ISP

Port Address Translation (PAT)
What technique does a router use to track a port number for when a data packet is returned to a home network to idenfity which computer to deliver the packet to?

crossover
a cable that has cross-connected TX/RX data lines

end to end
In a straight-through, how are transmit and receive signal pares aligned?

Straight-through ports
Also called an uplink port

an uplink port
allows the connection of a hub or switch to another hub or switch without having to use a crossover cable

computers, printers, and routers
Which devices require a cross-connect input port?

unlink connections to other switches or hubs
Which devices require a straight-through connection?

that the transmit and receive pairs are properly aligned and the connected devices are comunicating
What does a link light on the switch or hub indcate?

link integrity test
an Ethernet protocol used to verify that a communication link between two Ethernet devices has been established

to indicate that the link is up
Why are link pulses sent by each of the connected devices via the twisted pair cables?

at regular intervals
when are link pulses sent when data is not being transmitted?

the ping command
Uses Internet Control Message Protocol (ICMP) echo request and replies to test that a device on the network is reachable

the command window
Where is the ping command issued in Windows to verify the networking devices are communicationg?

CAT6
twisted pair cables capable of carrying up to 1000 mbps (1 gigabit) of data up to a length of 100 meters

1518 bytes
What is the maximum length of the Ethernet fram from destination MAC address through the frame check sequence?

MAC
Media Access Control

MAC address
Each NIC or network interface card has a unique network address called what?

6 bytes or 48 bits
What is the length of a MAC address?

12 hexadecimal digits
A MAC address is displayed in which format?

The first six digits
The Organizationally Unique Identifier (OUI) is which digits of the MAC address?

organizationally unique identifier OUI)
Indicates the vendor of the network interface

The last six digits of a MAC address
A unique value for each NIC assigned by the vendor

MAC address
Also called the Ethernet address, the physical address, the hardware address, and the adapter address

MAC address
What does ipconfig/all display when entered as a command in the command mode or at the MS-DOS prompt?

hexadecimal (base-16)
Which base are MAC addresses listed in?

MAC address
Only provides the physical address for the network interface card

the network location, what LAN, or in which building, city, or country the network resides
A mac address does not provide what?

Internet Protocol (IP)
Incorporates a unique address that identifies the computer’s network

Internet Assigned Numbers Authority (IANA)
Who assigns IP network numbers?

32
How many bits are in an IP address?

IP address
Identifies on which network the computer is located and differentiates the computer from all other devices on the same network

four 8 bit parts
How many bit parts are each IP address divided into?

governments and very large networks
What are class A ip addresses used for?

16,777 or 2^24
What is the maximum number of hosts for a class A ip address?

midsize companies, universities
What are class B ip addresses used for?

65,534 or 2^16
What are the maximum number of hosts on a class B ip address?

small networks
What are class C ip addresses used for?

254 or 2^8
What are the maximum number of hosts for a class C IP address?

reserved for multicast groups
What are class D ip addresses used for?

0 thru 127
What do class A ip addresses begin with?

128 thru 191
What do class B ip addresses begin with?

192 thru 223
What do class C ip address begin with?

224 thru 239
what do class D ip addresses begin with?

the network number
The first set of numbers in an IP address are what?

defines which network the IP packet is originating from or being delivered to
What does the network number do?

the Host number
What are the last three sets of numbers in an IP address?

the Host address
The Host number is also called what?

The Host number
The portion of the IP address that defines the address of the networking device that is connected to the network

display which network an IP packet is coming from or going to, and which device on that network an IP packet is coming from or going to.
What do the network number and the host number do when they are together?

the local network system administrator or your Internet Service Provider (ISP)
Who assigns the host number?

the IP address for your computer
ipconfig in the command prompt will display what?

Private address
IP addresses set aside for use in a private intranet

intranet
An internal Internetwork that provides file and resource sharing

They are invalid addresses reserved for internal use and are not routable on the internet.
Why can’t private addresses be used on the internet?

private addresses
Can be used within a private LAN (intranet) to create an IP Internetwork

IP Internetwork
uses IP addressing for indentifying devices connected to the network

IP Internetwork
Is also the addressing scheme used in TCP/IP networks

TCP/IP
Transmission Control Protocol/Internet Protocol

TCP/IP
the protocol suite used for Internetworks such as the Internet

wired network
Uses cables and connectors to establish the network connection

wireless network
uses radio signals to establish the network connection

wireless network
What is the most common home network configuration?

“1. faster network data transfer speedds (within the LAN)

  1. relatively inexpensive to set up
  2. network is not susceptible to outside interference”
    What are the advantages of a wired network?

“1. Cable connections typically require the use of specialized tools

  1. the cable installation can be labor intensive
  2. The cable installation can be expensive”
    What are the disadvantages of a wired network?

“1. mobility
2.simple installation

  1. no cables”
    What are the advantages of a wireless network?

“1.security issues
2.data speeds within the LAN can be slower”
What are the disadvantages of a wireless network?

Wi-Fi
Another name for a wireless network and the abbreviated name for the WI-FI Alliance, or wireless fidelity

An organization whose function is to test and certify wireless equipment for compliance with the 802.11x standards
What is the Wi-Fi Alliance?

802.11x
A group of wireless standards developed under IEEE 802.11

54 mbps
What is the data transfer rate of 802.11a wireless standard?

up to 75 feet
What is the operating range for the 802.11a wireless standard?

5 GHz
802.11a standard operates at what GHz?

802.11b,g, and n
Which 802.11x wireless standards all operate at 2.4 GHz?

up to 11 mbps with ranges of 100-150 feet
What are the data transfer rates and operating ranges for 802.11b wireless standard?

up to 54 Mbps and up to 150 feet
What are the data transfer rates and operating ranges for 801.11g wireless standard?

802.11n wireless standard
The next generation of high speed wireless connectivity

4 x 802.11g speeds (200+ mbps)
What is the data transfer rate for 802.11n wireless standard?

via a cable modem and DSL
What are the two most common broadband connections to the Internet Service Provider (ISP)?

One of the computers
In some cases, what device may also have the configuration settings for managing the router, which can include the setting for connecting to the ISP?

wireless router
A device used to interconnect wireless networking devices and to give access to wired devices, and establish the broadband internet connection to the ISP

switch
Is a hub or switch the best choice for interconnecting networking devices?

network interface card or NIC
A type of network adapter used in desktop computers

A wired network adapter
Can be a NIC inserted into an expansion slot on the computers motherboard

Notebook computers
Where does a PC Card adapter connect to?

provides an RJ-45 jack for connecting to wired networks
What does a PC card adapter do?

Both 10 mbps and 100 mbps networks
The PC card adapter supports connects to which networks?

b,g, and n
Which 802.11x wireless technologies are compatible?

The slowest speed
When there is a combination of wireless b, g, and/or n technologies, which frequency will be set for the combined technologies?

A notebook or laptop computer PC card slot
Where does a wireless n adapter insert into?

Wireless n
Which wireless technologies offer the highest data transfer speed?

The USB port on a computer
Where does a USB network adapter connect to?

A router
A networking device used to connect two or more networks using a single connection to your ISP such as your LAN and the Internet

Access point
A device used to interconnect wireless devices and provide a connection to the wired LAN.

A router, switch, and wireless access point
What does a wireless router contain?

A wireless router
Which is the most common way to interconnect wireless LANs to the ISP’s access device?

broadband modem/gateway
A device used to provide high speed data access via your cable connection or via a telephone company’s DSL connection

a gateway
combines a modem and a router into one network box

cable modem
a device that is used to make a broadband network connection from your home network to the ISP using your cable connection.

a splitter
What tool does a cable modem require at setup to separate the cable TV from the home network

the cable TV service provider
Who is the iSP for a cable modem usually?

DSL modem
a device that is used to make a broadband connection from your home network to the ISP using the telephone line

the telephone company or separate ISP
Who is the ISP for a DSL modem?

The placement of filters on all telephone lines except the one going into the modem to prevent interference.
What does a DSL connection to a DSL modem require?

data speed, cost, ease of implementation, appearance, home access, and public access
What issues should be considered when planning a home network?

wired network
Which network offers the fastest speeds for a home network?

up to 10 gbps
What data transfer rates can a wired network offer up to inside the home network?

wireless n technology
Which wireless technology can the best data transfer rates be achieved with in a wired home network?

wireless networks
Which type of network is less expensive to implement in a home network?

it has only one external connection to the ISP
Why does the wireless network offer the best appearance for a home network?

the wired network
Which network will offer the best data transfer speed for home access of the home network?

best mobility
the wireless network will offer what for home access of the home network?

the data rate transfer connection to and from the ISP
What is the limiting factor when considering the data transfer rate for public access?

“1. Check the lights on the networking device

  1. Reboot the host computer connected to the router and reboot the router
  2. Verify the hardware cable or phone connection is in place
  3. Verify your network settings”
    What are the four steps for troubleshooting wired and wireless home networks?

a connection problem with your network device
Wheat do incorrect lights on the networking device indicate?

sources,

https://www.wgu.edu/
https://access.wgu.edu/pingfed/as/authorization.oauth2?response_type=code&client_id=wgu&redirect_uri=https%3A%2F%2Fmy.wgu.edu%2Fpa%2Foidc%2Fcb&state=eyJ6aXAiOiJERUYiLCJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiUnowVEl5d3p4a1RKaGdkMWJ1UEIxOERsYzNNIiwic3VmZml4IjoiTjk5cWxaLjE3MDMyMjYwMzMifQ..G-LhhWmX5ExYU3a3ov6q_A.7i8K7NJNq0akj0H2_sNIByINtfPH0MB_qzh9W-zur_ZsuCjFdLl_V6zDkNNSAp5tUjV4zwD4_x-dxTxzFFvlzLxNzX1LwVL2wPx604HgWvU.QNaRwTUzEvYof-GDcdnYKg&nonce=Y9PnqE7BKfxNZ3C9EeQovxqNeFqMz_IsPaUch6ZkuZY&scope=openid%20profile%20address%20email%20phone&vnd_pi_requested_resource=https%3A%2F%2Fmy.wgu.edu%2F&vnd_pi_application_name=Student+Portal+PROD+%28my.wgu.edu%29

Scroll to Top