OA Exams

  • web.groovymark@gmail.com
  • November 24, 2024

Question 21

Which protocol provides connectionless communication in the transport layer?

a) TCP
b) UDP
c) IP
d) FTP

Correct Answer: b) UDP

Explanation: UDP provides connectionless communication, making it faster but less reliable than TCP.

Question 22

A topology where devices are connected directly to each other in a loop.

a) Star
b) Ring
c) Bus
d) Mesh

Correct Answer: b) Ring

Explanation: In a ring topology, each device is connected to two others, forming a closed loop.

Question 23

What type of attack intercepts communication between two parties?

a) Phishing
b) Man-in-the-middle
c) Denial of service
d) Spoofing

Correct Answer: b) Man-in-the-middle

Explanation: In a man-in-the-middle attack, the attacker intercepts communication between two parties to steal or alter data.

Question 24

The process of sending unwanted emails to users is called?

a) Spoofing
b) Phishing
c) Spamming
d) Hacking

Correct Answer: c) Spamming

Explanation: Spamming involves sending unsolicited emails, often for advertising purposes.

Question 25

What does the term “spoofing” refer to in network security?

a) Overloading a server with traffic
b) Gaining unauthorized access
c) Faking the identity of a user or device
d) Intercepting network traffic

Correct Answer: c) Faking the identity of a user or device

Explanation: Spoofing involves falsifying the identity of a device or user to gain unauthorized access.

Question 26

Which OSI layer is responsible for end-to-end connections and reliability?

a) Session
b) Transport
c) Data Link
d) Application

Correct Answer: b) Transport

Explanation: The transport layer is responsible for ensuring end-to-end communication and reliability between devices.

Question 27

A device that amplifies and retransmits signals over long distances is called?

a) Router
b) Repeater
c) Switch
d) Firewall

Correct Answer: b) Repeater

Explanation: A repeater extends the distance over which a signal can travel by amplifying it.

Question 28

 The layer responsible for translating data between the network and the application.

a) Application
b) Presentation
c) Data Link
d) Session

Correct Answer: b) Presentation

Explanation: The presentation layer translates data between the application and network layers, ensuring compatibility.

Question 29

What is the function of an intrusion detection system (IDS)?

a) To prevent attacks
b) To detect unauthorized activity
c) To manage network traffic
d) To assign IP addresses

Correct Answer: b) To detect unauthorized activity

Explanation: IDS monitors network traffic to detect and alert administrators to suspicious or unauthorized activity.

Question 30

What is the benefit of using a VPN?

a) It increases network speed
b) It provides a secure connection over public networks
c) It assigns IP addresses automatically
d) It filters network traffic

Correct Answer: b) It provides a secure connection over public networks

Explanation: A Virtual Private Network (VPN) encrypts data and provides a secure connection, even over public networks.

Question 31

Which wireless encryption protocol is considered the most secure?

a) WEP
b) WPA
c) WPA2
d) WPA3

Correct Answer: d) WPA3

Explanation: WPA3 is the latest and most secure wireless encryption protocol, offering better protection than WPA and WPA2.

Question 32

Which OSI layer is involved in creating the sessions between applications?

a) Session
b) Presentation
c) Network
d) Transport

Correct Answer: a) Session

Explanation: The session layer is responsible for setting up, managing, and terminating sessions between applications.

Question 33

What is a firewall’s role in network security?

a) To manage IP addresses
b) To monitor user activity
c) To block unauthorized access
d) To speed up network connections

Correct Answer: c) To block unauthorized access

Explanation: Firewalls block unauthorized access and help protect networks from attacks.

Question 34

A wireless standard that operates in the 5 GHz frequency range.

a) 802.11b
b) 802.11g
c) 802.11a
d) 802.11n

Correct Answer: c) 802.11a

Explanation: 802.11a operates in the 5 GHz frequency band and offers higher data rates.

Question 35

What is the recommended API for accessing Azure Cosmos DB with a graph-based data structure?

a) To assign IP addresses
b) To route data packets between networks
c) To filter traffic based on MAC addresses
d) To broadcast data to all connected devices

Correct Answer: c) To filter traffic based on MAC addresses

Explanation: A switch uses MAC addresses to filter and forward traffic to the correct destination.

Question 36

Which OSI layer handles flow control and error correction?

a) Network
b) Transport
c) Data Link
d) Physical

Correct Answer: b) Transport

Explanation: The transport layer handles flow control and error correction to ensure reliable data transmission.

Question 37

A topology where each device is connected to every other device.

a) Mesh
b) Star
c) Ring
d) Bus

Correct Answer: a) Mesh

Explanation: In a mesh topology, each device is connected to every other device, providing redundancy and fault tolerance.

Question 38

What does a router do in a network?

a) Filters MAC addresses
b) Amplifies signals
c) Routes data between networks
d) Blocks unauthorized access

Correct Answer: c) Routes data between networks

Explanation: A router directs traffic between different networks by forwarding data packets based on IP addresses.

Question 39

 A type of attack where a hacker intercepts communication between two devices.

a) Phishing
b) Man-in-the-middle
c) Denial of service
d) Spoofing

Correct Answer: b) Man-in-the-middle

Explanation: A man-in-the-middle attack occurs when a hacker intercepts and potentially alters communication between two devices

Question 40

 The process of dividing data into smaller units for transmission.

a) Encryption
b) Compression
c) Segmentation
d) Routing

Correct Answer: c) Segmentation

Explanation: Segmentation involves dividing data into smaller pieces for more efficient transmission across networks.

Complete the Captcha to view next question set.

Prev Post
WGU D315 Practice Exam Questions – Set 2 – Part 1
Next Post
WGU D315 Practice Exam Questions – Set 2 – Part 3