OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • December 3, 2024

Question 41

Which protocol is used to retrieve email from a mail server and allows users to keep messages on the server?

a) SMTP
b) POP3
c) IMAP
d) SNMP

Correct Answer: c) IMAP

Explanation: IMAP (Internet Message Access Protocol) allows users to retrieve email from a server and keep messages stored on the server.

Question 42

What technology allows network traffic to be divided into multiple isolated segments, even though they share the same physical infrastructure?

a) NAT
b) VLAN
c) DHCP
d) VPN

Correct Answer: b) VLAN

Explanation: VLAN (Virtual Local Area Network) allows network traffic to be divided into isolated segments within the same physical network.

Question 43

A technician needs to configure a switch port to support multiple VLANs. Which configuration should be applied to the port?

a) Access port
b) Trunk port
c) Loopback port
d) Spanning port

Correct Answer: b) Trunk port

Explanation: A trunk port allows multiple VLANs to traverse a single switch port.

Question 44

A user reports that they are unable to connect to a remote server by its hostname but can connect by its IP address. What is most likely the issue?

a) IP conflict
b) DNS issue
c) Firewall block
d) VLAN misconfiguration

Correct Answer: b) DNS issue

Explanation: If a user can connect to a server by IP but not by hostname, there is likely a DNS resolution issue.

Question 45

Which of the following methods can be used to prevent unauthorized devices from connecting to a wireless network?

a) Disable SSID broadcast
b) Enable MAC filtering
c) Use static IP addressing
d) Enable DHCP snooping

Correct Answer: b) Enable MAC filtering

Explanation: MAC filtering is used to control which devices are allowed to connect to a wireless network based on their MAC addresses.

Question 46

A company wants to implement a solution that allows users to authenticate to multiple services using a single set of credentials. Which technology should be implemented?

a) MFA
b) SSO
c) VPN
d) LDAP

Correct Answer: b) SSO

Explanation: SSO (Single Sign-On) allows users to authenticate to multiple services using a single set of credentials.

Question 47

Which protocol is used to manage network devices such as switches and routers?

a) SMTP
b) SNMP
c) HTTP
d) DHCP

Correct Answer: b) SNMP

Explanation: SNMP (Simple Network Management Protocol) is used to monitor and manage network devices.

Question 48

A network technician needs to configure a static route on a router. What information is required to create the static route?

a) DNS server IP
b) Default gateway
c) Destination network and next-hop IP
d) DHCP server IP

Correct Answer: c) Destination network and next-hop IP

Explanation: To create a static route, the destination network and the next-hop IP address must be specified.

Question 49

Which of the following best describes an IPS (Intrusion Prevention System)?

a) A device that monitors network traffic for malicious activity and blocks it in real-time
b) A tool used for analyzing network traffic logs
c) A software used to detect and prevent phishing emails
d) A service that filters spam emails

Correct Answer: a) A device that monitors network traffic for malicious activity and blocks it in real-time

Explanation: An IPS monitors network traffic for suspicious activity and can actively block malicious traffic.

Question 50

Which technology allows for the secure transmission of data between two devices over the internet by creating a private network within the public internet?

a) NAT
b) VLAN
c) VPN
d) DNS

Correct Answer: c) VPN

Explanation: VPN (Virtual Private Network) allows for secure transmission of data by creating an encrypted tunnel between two devices over the internet.

 

Complete the Captcha to view next question set.

Prev Post
WGU D325 Practice Exam Questions – Set 4 – Part 2
Next Post
WGU D325 Practice Exam Questions – Set 5 – Part 2