{"id":130866,"date":"2023-12-23T09:43:14","date_gmt":"2023-12-23T09:43:14","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=130866"},"modified":"2023-12-23T09:43:16","modified_gmt":"2023-12-23T09:43:16","slug":"wgu-c172-pre-assessment-latest-2023-2024-update-network-and-security-foundations-questions-and-verified-answers-100-correct-grade-a-2","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/12\/23\/wgu-c172-pre-assessment-latest-2023-2024-update-network-and-security-foundations-questions-and-verified-answers-100-correct-grade-a-2\/","title":{"rendered":"WGU C172 Pre- Assessment (Latest 2023\/ 2024 Update) Network and Security Foundations| Questions and Verified Answers| 100% Correct| Grade A"},"content":{"rendered":"\n<p>WGU C172 Pre- Assessment (Latest 2023\/ 2024 Update) Network and Security Foundations| Questions and Verified Answers| 100% Correct| Grade A<\/p>\n\n\n\n<p>WGU C172 Pre- Assessment (Latest 2023\/<br>2024 Update) Network and Security<br>Foundations| Questions and Verified<br>Answers| 100% Correct| Grade A<br>Q: Which network diagnostic tool displays the path packets take between two endpoints?<br>Answer:<br>Traceroute<br>Q: Which network type is used to wire multiple PCs to a home router?<br>Answer:<br>LAN<br>Q: An office&#8217;s infrastructure connects network devices and printers through a central access<br>point without the use of cabling.<br>Which network type does this office use?<br>Answer:<br>WLAN<br>Q: What type of medium is commonly used within a 1000 Mbps Ethernet network?<br>Answer:<br>CAT5e<br>Q: Which network topology is shown in the following diagram?<br>Answer:<br>Full mesh<\/p>\n\n\n\n<p>Q: Which network topology is being implemented when each node connects to exactly two<br>other nodes, forming a single continuous pathway for signals through each node?<br>Answer:<br>Ring<br>Q: In which physical LAN topology are nodes connected to each other with a backbone cable<br>that loops around and ends at the same point it started?<br>Answer:<br>Ring<br>Q: Which cloud service provides hardware, operating systems, and web servers but not enduser applications?<br>Answer:<br>PaaS (Platform as a service)<br>Q: Which cloud model provides an exclusive cloud computing service envi- ronment that is<br>shared between two or more organizations?<br>Answer:<br>Community<br>Q: Which type of software is used to provide virtualization?<br>Answer:<br>Hypervisor<\/p>\n\n\n\n<p>Q: Which OSI layer ensures error-free packets?<br>Answer:<br>Transport<br>Q: Which topology uses a switch or hub to connect to all devices in the same network?<br>Answer:<br>Star<br>Q: A user that does not want to be identified while communicating on a network uses an<br>application to alter the computer&#8217;s identity.<br>Which type of exploit is being perpetrated?<br>Answer:<br>Spoofing<br>Q: An attacker attempts to misdirect traffic on a network back to the attacker by corrupting the<br>network computer&#8217;s cache of IP address to MAC address mappings that are cached.<br>Which exploit is the attacker perpetrating?<br>Answer:<br>ARP poisoning<br>Q: Which exploit actually breaches the physical medium or uses devices to monitor signals<br>from outside the physical medium itself?<br>Answer:<br>Wiretapping<br>Q: Which type of attack can overwhelm a web server by inserting more data into a web form<br>than the system was configured to hold?<br>Powered by <a href=\"https:\/\/learnexams.com\/search\/study?query=\" target=\"_blank\" rel=\"noopener\">https:\/\/learnexams.com\/search\/study?query=<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/learnexams.com\/search\/study?query=\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/12\/wgu-c955-pre-assessment-latest-2023-2024-update-applied-probability-and-statistics-questions-and-verified-answers-100-correct-grade-a-1-725x1024.png\" alt=\"\" class=\"wp-image-130867\"\/><\/a><\/figure>\n\n\n\n<p>Network<br>Which OSI layer is related to the function of the IP protocol suite?<\/p>\n\n\n\n<p>Data Link<br>Which OSI layer is responsible for organizing how bits are passed over the physical layer between devices within the same collision domain?<\/p>\n\n\n\n<p>Transport<br>Which OSI layer would define the scope of a protocol that makes sure packets of data are received correctly and resends them if they are not?<\/p>\n\n\n\n<p>TCP<br>Which protocol suite performs functions of OSI layer 4?<\/p>\n\n\n\n<p>CAT 6a<br>Which type of Ethernet cable can maintain 10Gbps transmission speeds through the course of its maximum 100-meter length?<\/p>\n\n\n\n<p>DSL<br>Which Internet access technology uses ordinary telephone wires for data transmission?<\/p>\n\n\n\n<p>Patch panel<br>Which device is used to organize network cables as they run between switches and other network devices?<\/p>\n\n\n\n<p>Router<br>Which network device is used to connect two or more network segments by performing OSI layer 3 functions like packet-forwarding?<\/p>\n\n\n\n<p>Modem<br>Which network device is used to convert between digital information from a LAN and analog signals for transmission over a standard telephone wire?<\/p>\n\n\n\n<p>Dumb terminal<br>Which device could be used to sent commands to the mainframe for remote execution in early mainframe installations?<\/p>\n\n\n\n<p>Router<br>Which device is responsible for implementing network address translation (NAT)?<\/p>\n\n\n\n<p>nslookup<br>Which command produced the following output?<\/p>\n\n\n\n<p>Non-authoritative answer:<br>Name: www.google.com<br>Address: 172.217.11.132<\/p>\n\n\n\n<p>route<br>Which command should be used to manually enter the default gateway for a computer?<\/p>\n\n\n\n<p>traceroute<br>Which network diagnostic tool displays the path packets take between two endpoints?<\/p>\n\n\n\n<p>LAN<br>Which network type is used to wire multiple PCs to a home router?<\/p>\n\n\n\n<p>WLAN<br>An office&#8217;s infrastructure connects network devices and printers through a central access point without the use of cabling.<\/p>\n\n\n\n<p>Which network type does this office use?<\/p>\n\n\n\n<p>CAT5e<br>What type of medium is commonly used within a 1000Mbps Ethernet network?<\/p>\n\n\n\n<p>Ring<br>Which network topology is being implemented when each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node?<\/p>\n\n\n\n<p>Ring<br>In which physical LAN topology are nodes connected to each other with a backbone cable that loops around and ends at the same point it started?<\/p>\n\n\n\n<p>Transport<br>Which OSI layer ensures error-free packets?<\/p>\n\n\n\n<p>Star<br>Which topology uses a switch or hub to connect all devices to the same network?<\/p>\n\n\n\n<p>PaaS (Platform as a Service)<br>Which cloud service provides hardware, operating systems, and web servers but not end-user applications?<\/p>\n\n\n\n<p>Community<br>Which cloud model provides an exclusive cloud computing service environment that is shared between two or more organizations?<\/p>\n\n\n\n<p>Hypervisor<br>Which type of software is used to provide virtualization?<\/p>\n\n\n\n<p>Spoofing<br>A user that does not want to be identified while communicating on a network uses an application to alter the computer&#8217;s identity.<\/p>\n\n\n\n<p>Which type of exploit is being perpetrated?<\/p>\n\n\n\n<p>APR poisoning<br>An attacker attempts to misdirect traffic on a network back to the attacker by corrupting the network computer&#8217;s cache of IP address to MAC address mappings that are cached.<\/p>\n\n\n\n<p>What exploit is the attacker perpetrating?<\/p>\n\n\n\n<p>Wiretapping<br>Which exploit actually breaches the physical medium or uses devices to monitor signals from outside the physical medium itself?<\/p>\n\n\n\n<p>Buffer overflow<br>Which type of attack can overwhelm a web server by inserting more data into a web form that the system was configured to hold?<\/p>\n\n\n\n<p>Phishing<br>Which type of attack sends an email claiming to be from a reputable business in order to entice the recipient to provide sensitive information?<\/p>\n\n\n\n<p>Sniffer<br>A user on a network is planning to launch an exploit against a coworker in a neighboring department. The user needs to identify the IP address of a coworker in the desired department.<\/p>\n\n\n\n<p>Which tool or utility will allow the user to watch network traffic in real time to identify a target?<\/p>\n\n\n\n<p>Red team<br>Which group of attackers is typically used for penetration testing?<\/p>\n\n\n\n<p>Zero-day<br>Which type of attack exploits an unpatched software vulnerability?<\/p>\n\n\n\n<p>Default Password<br>A company has the policy that all new user passwords are P@ssw0rd but does not require new users to change their password. An employee randomly tries a coworker&#8217;s account with the new user password to see if they can log in as the coworker.<\/p>\n\n\n\n<p>Which type of vulnerability does this create?<\/p>\n\n\n\n<p>BYOD\/Mobile<br>An employee that does not want to miss emails from important clients sets up her cellular smartphone to allow her to check email. Unfortunately, she does not install antivirus software on the cellular phone.<\/p>\n\n\n\n<p>What type of vulnerability is represented?<\/p>\n\n\n\n<p>VPN (Virtual Private Network)<br>What is required to establish a secure connection to a remote network over an insecure link?<\/p>\n\n\n\n<p>Institute a log-in policy that locks users out of an account after three failed password attempts.<br>An organization is concerned about brute force attacks.<\/p>\n\n\n\n<p>How should the organization counter this risk?<\/p>\n\n\n\n<p>Provide regular cybersecurity training for employees<br>An organization suffers a social engineering attack that results in a cybercriminal gaining access to its network and to its customers private information.<\/p>\n\n\n\n<p>How can the organization mitigate this risk in the future?<\/p>\n\n\n\n<p>Patching<br>An attacker plans to exploit flaws in an operating system to gain access to a user&#8217;s computer system.<\/p>\n\n\n\n<p>What is a prevention mechanism for this type of attack?<\/p>\n\n\n\n<p>Access Controls<br>An unauthorized third-party has gained access to a company network.<\/p>\n\n\n\n<p>How can they prevented from deleting data?<\/p>\n\n\n\n<p>MFA (Multi-factor Authentication)<br>An attacker has gained access to the passwords of several employees of a company through a brute force attack.<\/p>\n\n\n\n<p>Which authentication method would keep the attacker from accessing the employees&#8217; devices?<\/p>\n\n\n\n<p>Trojan horse<br>After downloading a CD\/DVD burning program, a user notices that someone is remotely accessing the computer during the nighttime hours.<\/p>\n\n\n\n<p>Which type of malware is likely found in the CD\/DVD software?<\/p>\n\n\n\n<p>Unplug the PC&#8217;s network connection<br>A user is working on a home computer when another user seems to open an application to view documents on the same computer. The user immediately suspects that a back door into the computer exists.<\/p>\n\n\n\n<p>Which action should be taken first to deal with the problem?<\/p>\n\n\n\n<p>Open a new browser page, navigate to the bank&#8217;s website, and acquire legitimate contact information to report the email.<br>A user received an email from an unknown bank saying that the user&#8217;s account with the bank has been compromised. The user suspects that this is a phishing exploit.<\/p>\n\n\n\n<p>How should the user safely proceed?<\/p>\n\n\n\n<p>Availability<br>An analyst has identified an active denial of service attack.<\/p>\n\n\n\n<p>Which category of the CIA triad is affected?<\/p>\n\n\n\n<p>Confidentiality<br>While investigating a security incident, a technician discovers an unauthorized packet-capturing tool on the network.<\/p>\n\n\n\n<p>Which category of the CIA triad is being attacked?<\/p>\n\n\n\n<p>Availability<br>A malicious user was able to lock a user&#8217;s account after guessing the user&#8217;s password multiple times unsuccessfully.<\/p>\n\n\n\n<p>Which category of the CIA triad did the malicious user target in this attack?<\/p>\n\n\n\n<p>Integrity<br>Which category of the CIA triad is affected when an unauthorized user changes the data within a read-only file?<\/p>\n\n\n\n<p>Circuit level<br>Which type of firewall initiates a new connection on behalf of the client and presents its own IP to the server when a client initiates a connection to a server?<\/p>\n\n\n\n<p>Port Address Translation (PAT)<br>Which feature of a firewall allows an organization to use private non-routable networks while enabling communication to the internet?<\/p>\n\n\n\n<p>It refers to the connection state of a conversation between two computers.<br>What is the meaning of &#8220;state&#8221; when referring to stateful inspection in firewalls?<\/p>\n\n\n\n<p>Antivirus<br>What can a user install to detect malicious software?<\/p>\n\n\n\n<p>Reputation-based prevention<br>Which feature of a network intrusion prevention system (NIPS) uses a list of known bad IP addresses to protect the network?<\/p>\n\n\n\n<p>Transportation Layer Security (TLS)<br>A company provides access to employees&#8217; tax and personal information via a public-facing web portal.<\/p>\n\n\n\n<p>What should the company implement to encrypt the employees&#8217; web access to this information?<\/p>\n\n\n\n<p>ARP spoofing<br>Which attack tricks a client into mapping an IP address to a spoofed MAC address?<\/p>\n\n\n\n<p>Trunk<br>Which type of port has access to all VLANs by default in a traditional layer 2 switch?<\/p>\n\n\n\n<p>Data is encrypted on the senders system and only the recipient is able to decrypt it.<br>What is end-to-end encryption?<\/p>\n\n\n\n<p>In the clear<br>Which phrase describes unencrypted data?<\/p>\n\n\n\n<p>WPA2+AES<br>Which type of wireless security protocol is the most secure?<\/p>\n\n\n\n<p>AES requires less CPU utilization and uses a larger block size than 3DES.<br>Which statement is true when comparing AES encryption to Triple DES (3DES)?<\/p>\n\n\n\n<p>Never use unsecured Wi-Fi hotspots.<br>What is the best defense against fake access attacks?<\/p>\n\n\n\n<p>Data backups and archives<br>Which cloud feature is used to prevent data loss and provide for data retrieval in the event of a disaster?<\/p>\n\n\n\n<p>Private<br>Which cloud-hosting model provides exclusive cloud access for a single company?<\/p>\n\n\n\n<p>Private key encryption<br>What should a cloud provider use to secure data in flight?<\/p>\n\n\n\n<p>Authentication<br>An administrator fails to configure protection for usernames and passwords transmitted across the network.<\/p>\n\n\n\n<p>Which component of the AAA model is weakened?<\/p>\n\n\n\n<p>Authorization<br>A user is mistakenly granted access to customer accounts not required for his duties.<\/p>\n\n\n\n<p>Which component of the AAA model is violated?<\/p>\n\n\n\n<p>Proxy servers<br>Which type of firewall technology reads and analyzes the actual content of a message before forwarding to its destination?<\/p>\n\n\n\n<p>Honeypots<br>An organization&#8217;s IT department is concerned that malicious insiders may be using elevated access rights.<\/p>\n\n\n\n<p>Which security control can be used to draw attacks away from critical systems?<\/p>\n\n\n\n<p>Firewall<br>Which network device is usually placed in-line between a trusted network and an untrusted network?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>WGU C172 Pre- Assessment (Latest 2023\/ 2024 Update) Network and Security Foundations| Questions and Verified Answers| 100% Correct| Grade A WGU C172 Pre- Assessment (Latest 2023\/2024 Update) Network and SecurityFoundations| Questions and VerifiedAnswers| 100% Correct| Grade AQ: Which network diagnostic tool displays the path packets take between two endpoints?Answer:TracerouteQ: Which network type is used to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-130866","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/130866","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=130866"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/130866\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=130866"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=130866"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=130866"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}