WGU Network and Security -
Foundations - C172 - Most Import
Materials for Final Objective Assessment
Test
802.11a/Wireless-A ✔✔wireless 5GHz - 54Mbps - *75ft*
802.11b/Wireless-B ✔✔wireless 2.4GHz - *11Mbps* - 100-15
...
WGU Network and Security -
Foundations - C172 - Most Import
Materials for Final Objective Assessment
Test
802.11a/Wireless-A ✔✔wireless 5GHz - 54Mbps - *75ft*
802.11b/Wireless-B ✔✔wireless 2.4GHz - *11Mbps* - 100-150ft
802.11g/Wireless-G ✔✔2.4GHz - *54Mbps - 150ft*
802.11ac/Wireless-AC ✔✔5GHz - *1.3Gbps*
802.11n/Wireless-N ✔✔2.4GHz - *200+Mbps*
2.4GHz ✔✔Frequency ranges of 802.11G/802.11B
5GHz ✔✔Frequency ranges of 802.11AC/802.11A
Application Layer ✔✔Layer 7 in the OSI model. Support for applications. Examples: HTTP, FTP,
SMTP
Presentation Layer ✔✔Layer 6 in the OSI model. Protocol conversion, data translation. Examples:
ASCII, JPEG
Session Layer ✔✔Layer 5 in the OSI model. Establishes, manages, and terminates sessions.
Examples: NFS, SQL
Transport Layer ✔✔Layer 4 in the OSI model. Ensures error-free packets. Examples: TCP, UDP
Network Layer ✔✔Layer 3 in the OSI model. Provides routing decisions. Examples: IP, IPX
Data Link Layer ✔✔Layer 2 in the OSI model. Provides for the flow of data. Examples: MAC
addresses.
Physical Layer ✔✔Layer 1 in the OSI model. Signals and media. Examples: NICs, twisted-pair
cable, fiber.
OSI model ✔✔Application, Presentation, Session, Transport, Network, Data Link, Physical.
(*P*lease *D*o not *T*hrough *S*asuage *P*izza *A*way)
Application Layer (TCP/IP) ✔✔Defines the applications used to process requests and which ports
and sockets are used
Transport Layer (TCP/IP) ✔✔Defines the type of connection established between hosts and how
acknowledgements are sent
Internet Layer (TCP/IP) ✔✔Defines the protocols used for addressing and routing the data packets
Network interface Layer (TCP/IP) ✔✔Defines how the host connects to the network
The well-known ports ✔✔TCP/IP Ports 1-1023
Registered ports ✔✔TCP/IP Ports 1024-49,151
Private ports ✔✔TCP/IP Ports 49,152-65,535
Social Engineering ✔✔A process by which an intruder obtains enough information from people
to gain access to the network
Password Cracking ✔✔An attack in which the attacker tries to guess the user's password
Dictionary Attack ✔✔An attack that uses known passwords and many variations (upper- and
lowercase and combinations) to try to log in to an account
Brute-Force Attack ✔✔An attack in which the attacker uses every possible combination of
characters to guess the password
Packet Sniffing ✔✔A technique in which the contents of data packets are watched
Man-in-the-Middle Attack/MITM ✔✔An attack in which an attacker can seamlessly place itself
in the middle of a conversation between others in order to become the recipient of all information
sent by victim computers
ARP Cache Poisoning
ARP Cache Poisoning Attack ✔✔An attack in which an attacker changes the MAC addresses of
the ARP cache, or "poisons the ARP cache" of victims to the MAC address of the attacker so that
conversations get redirected to the attacker
Evil Twin Attack ✔✔A situation in which a rogue wireless access point poses as a legitimate one
by broadcasting a legitimate SSID and eavesdrops on the wireless network
Session Hijacking ✔✔Exploiting web session control by stealing a session cookie and using it to
establish a session with a remote server that still thinks the session is valid
Buffer Overflow ✔✔A situation that occurs when a program tries to put more data into a buffer
than it was configured to hold
Zero-Day Attack ✔✔An attack that exploits a software vulnerability that is unknown to the
developer
Denial of Service Attack/DoS ✔✔An attack in which service is denied to a computer, network, or
server
Permanent DOS Attack/PDoS ✔✔A malicious attack that aims to sabotage hardware and render
it useless
14 ✔✔Amount of channels implemented with 802.11 DSSS
3 ✔✔Non overlapping 802.11 DSSS chan
[Show More]