• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

Network & Security Foundations Practice Test

Latest WGU Jan 17, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

Network & Security Foundations Practice Test 5.0 (2 reviews) Students also studied Terms in this set (64) Western Governors UniversityIT C182 Save

WGU D315 - PRE-ASSESSMENT: NET...

205 terms Mira_PakPreview WGU C172 Network and Security - F...233 terms kamerasheree Preview Network and Security - Foundations...47 terms aaldrich7906Preview

C172 N

34 terms dixu Practice questions for this set Learn1 / 7Study using Learn Which type of fiber cable is normally used to connect two buildings that are several miles apart?Which of the following describes a private cloud? Provides cloud services to a single organization Cynthia is working on her Western Governors University application online, when the admissions website crashes.She is unable to turn in her application on time. What part of the CIA Triad is affected?Availability Choose an answer 1Single-mode2Multi-mode 3Circuit-level4Twinaxial Don't know?

Which layer of the OSI model is responsible for the establishment, maintaining and terminating the connection between two systems?Session Which of the following describes a man-in-the-middle attack?A false server intercepts communications from a client by impersonating the intended server.With regards to AAA, _______ confirms that the user is how he or she claims to be.Authentication A company is concerned with traffic that flows through the network. There is a concern that there may be malware that exists that is not being blocked or eradicated by antivirus. What technology can be put in place to detect potential malware traffic on the network?

IDS Nancy is responsible for the administration of many different servers in her company. Which one of the following commands can she use to gain command-line administrative access to her Linux servers in a secure manner?

SSH A wireless deauthentication attack is an example of which

type of attack:

Denial of service attack Barry is working with his organization's platforms team to select a virtualization approach for use in their data center. To provide stronger security, he would like to select a hypervisor that runs directly on bare metal hardware without an intervening host operating system.What type of hypervisor should he choose?Type 1 Which of the following geographic network types are typically contained within city or county limits?Metropolitan Area Network (MAN) You have implemented a network where each device provides all other devices on the network with access to shared files. What type of network do you have?Peer-to-Peer You were recently hired by a small start-up company. The company has no plans to setup their own datacenter. You have been asked to find a cloud service that would provide several physical servers or virtual machines that the company would be able to install whatever operating systems and applications they need. Which cloud service model should you use?IaaS Which of the following hardware devices forwards a signal out all connected ports without examining the frame or packet contents?Hub or Repeater

Tom would like to determine what network ports are open on a newly commissioned server. Which one of the following tools is best suited for that task?Nmap Which of the following cloud computing solutions will deliver software applications to a client either over the internet or on a local area network?SaaS What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?Symmetric Which network is this? I allow computers to communicate with each other in the same building LAN Bob receives a message from Alice that she sent using an asymmetric cryptography algorithm. What key should he use to decrypt the message?Bob's private key In a hybrid cloud, data is traveling over the wide area network (WAN) connection between the private and public clouds is known as?Data in Transit What should we be concerned with keeping up to date? Office Suites Browser plugins Anti-virus A switch forwards data only to the port that are connected to the destination device. It knows which port to forward it to based on which value?MAC Address Which of the following strategies involves sharing some of the risk burden with someone else, such as an insurance company?Risk transference What type of attack targets an SQL database using the input field of a user?SQL injection Which of the following topologies connects all devices to a single cable?Bus Amazon Web Services, Microsoft Azure, and Google Cloud Platform are responsible for the physical data center security and most the physical hardware security concerns in which cloud deployment?Public Cloud Starting at layer 1 and going to layer 7 what are the layers

of the OSI model:

Physical, data link, network, transport, session, presentation, application

Diana is investigating suspicious software installed on a machine and would like to identify any network connections made by that machine. Which one of the following tools can best assist her with this task by running it on the target machine?netstat Alice would like to send a message to Bob using an asymmetric cryptography algorithm. What key should she use to encrypt the message?Bob's public key Tom would like to protect against an intruder tapping his network cable. Which cable provides the best protection against this type of attack?Fiber In cybersecurity, what does CIA stand for?Confidentiality, Integrity, Availability In a private cloud companies such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform are responsible for the physical data center security concerns.False Kyle is concerned that an attacker is probing his network and would like to use a decoy system to attract the attacker and analyze his or her activity. What type of tool would best meet Kyle's needs?Honeypot Which of the following topologies connects each device to a neighboring device?Ring Which of the following would provide the most effective security for a small wireless network?WPA2 Which one of the following wireless encryption protocols is considered the weakest and recommended to no longer use?

WEP Which attack floods a system with traffic in order to prevent legitimate activities or transactions from occurring?Denial of service attack With regards to AAA, ________ defines what the user can access and in what manner.Authorization In the OSI model, what is the primary function of the Network layer?Routes data between networks Which two layers of the OSI model are the same as the first layer of the TCP/IP model?Physical & Data Link Which of the following describes a public cloud? Provides cloud services to just about anyone

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

I was amazed by the detailed explanations in this document. It helped me ace my presentation. Truly excellent!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 17, 2026
Description:

Network & Security Foundations Practice Test 5.0 (2 reviews) Students also studied Terms in this set Western Governors UniversityIT C182 Save WGU D315 - PRE-ASSESSMENT: NET... 205 terms Mira_Pak Pr...

Unlock Now
$ 11.00