wgu d315 objective assessment prep Leave the first rating Students also studied Terms in this set (33) Science Computer Science Save
WGU D315 - PRE-ASSESSMENT: NET...
205 terms Mira_PakPreview WGU C172 Network and Security - F...233 terms kamerasheree Preview WGU D315 Network and Security Fo...70 terms drbeesaPreview Networ Teacher kilg Practice questions for this set Learn1 / 7Study using Learn Platform as a Service OSI application, presentation, sessionTCP/IP application OSI transportTCP/IP transport OSI networkTCP/IP network OSI data link, physicalTCP/IP network interface Choose an answer 1Maas2All Of The Mentioned 3Paas4Saas Don't know?
dumb terminalrelies on host computer for its processing power repeaterextends transmissions over longer distances modemconverts digital data to analog switchallows 2 or more IT devices to communicate bridgeconnects multiple LANs routerconnects multiple packet switched networks FTPallows user to authenticate to a remote server traceroutedisplays the path packets take between 2 end points pingtells the time it takes for a packet from its source to its destination ARPdisplays IP to physical address mappings for hosts that have been discovered in the ARP cache nmapfinds hosts and open ports on networks, used for vulnerability scans VLAN (virtual LAN)use a switch to create a virtual segment within a LAN network layer devicesrouter, NAT, PAT data link layer devicesNIC, Bridge, Switch bare-metal hypervisorloaded directly onto hardware IaasInfrastructure as a Service PaasPlatform as a Service SaasSoftware as a Service spoofing attacksman in the middle, VLAN, smurf man in the middle attackimpersonates the sender and receiver to intercept communication (use IPS to mitigate) VLAN hoppingAttacking the host of a VLAN to gain access to the resources on other VLANs that are not supposed to be accessible.smurf attackAn attack that broadcasts a ping request to computers yet changes the address so that all responses are sent to the victim
packet filtering firewallA limit is placed on the packets that can enter the network. Compares traffic against pre-established criteria.stateful inspection firewallActually looks inside packets, links them back together and discards unrelated packets stateless firewallDoesn't keep track of traffic flows access modecomputer can only send and receive traffic on the VLAN assigned by the switch trunk modecomputer may be able to send and receive traffic on any VLAN on the switch ICMP (internet control message protocol)devices in a network use this to communicate problems SSH (secure shell protocol)sets up remote encrypted connections between 2 computers