OA Exams

  • web.groovymark@gmail.com
  • November 24, 2024

Question 41

Which OSI layer translates and formats data for application programs?

a) Network
b) Session
c) Transport
d) Presentation

Correct Answer: d) Presentation

Explanation: The presentation layer is responsible for data formatting and translation for applications.

Question 42

A protocol that resolves domain names into IP addresses.

a) HTTP
b) DNS
c) FTP
d) IP

Correct Answer: b) DNS

Explanation: The Domain Name System (DNS) translates domain names into IP addresses for routing purposes.

Question 43

Which encryption protocol is often used for secure web communication?

a) FTP
b) SSH
c) SSL
d) Telnet

Correct Answer: c) SSL

Explanation: SSL (Secure Sockets Layer) is used to encrypt data during secure web communications.

Question 44

A device that connects two networks and forwards packets based on IP addresses.

a) Switch
b) Hub
c) Router
d) Repeater

Correct Answer: c) Router

Explanation: A router forwards packets between two or more networks based on their IP addresses.

Question 45

What is the main advantage of a mesh topology?

a) It is easy to set up
b) It provides redundancy and fault tolerance
c) It is cost-effective
d) It requires fewer cables

Correct Answer: b) It provides redundancy and fault tolerance

Explanation: Mesh topology ensures that if one connection fails, other paths are available, making it highly reliable.

Question 46

A system that prevents malware from executing by identifying known malicious code.

a) IDS
b) Firewall
c) Antivirus
d) VPN

Correct Answer: c) Antivirus

Explanation: Antivirus software scans and identifies malicious code, preventing it from running on the system.

Question 47

What does the acronym “VPN” stand for?

a) Virtual Port Network
b) Virtual Private Network
c) Virtual Packet Network
d) Virtual Protocol Network

Correct Answer: b) Virtual Private Network

Explanation: A VPN provides a secure, encrypted connection over a public network, such as the Internet

Question 48

What is the main purpose of a DMZ in network security?

a) To increase network speed
b) To isolate public-facing services from the internal network
c) To provide user authentication
d) To route data between networks

Correct Answer: b) To isolate public-facing services from the internal network

Explanation: A DMZ (Demilitarized Zone) is used to host public-facing servers while isolating them from the internal network to enhance security.

Question 49

A type of wireless encryption that is considered weak and outdated.

a) WPA2
b) WPA3
c) WEP
d) SSL

Correct Answer: c) WEP

Explanation: WEP (Wired Equivalent Privacy) is an outdated encryption method that is vulnerable to attacks.

Question 50

Which wireless protocol is used for short-range communication between devices, such as connecting a phone to a headset?

a) Wi-Fi
b) Bluetooth
c) NFC
d) Zigbee

Correct Answer: b) Bluetooth

Explanation: Bluetooth is a wireless protocol used for short-range communication between devices like smartphones and headsets.

 

Complete the Captcha to view next question set.

Prev Post
WGU D315 Practice Exam Questions – Set 2 – Part 2
Next Post
WGU D315 Practice Exam Questions – Set 3 – Part 1