OA Exams

  • web.groovymark@gmail.com
  • November 24, 2024

Question 21

Which wireless encryption protocol is now considered insecure and should not be used?

a) WPA
b) WEP
c) WPA2
d) WPA3

Correct Answer: b) WEP

Explanation: WEP (Wired Equivalent Privacy) has known vulnerabilities and is no longer considered secure.

Question 22

 What type of attack involves overwhelming a system with traffic to prevent legitimate access?

a) Spoofing
b) Phishing
c) Denial of Service (DoS)
d) Man-in-the-middle

Correct Answer: c) Denial of Service (DoS)

Explanation: A DoS attack floods a system with traffic, making it unavailable to legitimate users.

Question 23

In networking, what does NAT stand for?

a) Network Address Translation
b) Network Access Technology
c) Network Address Tunneling
d) Network Access Transfer

Correct Answer: a) Network Address Translation

Explanation: NAT translates private IP addresses into public IP addresses for devices to access external networks.

Question 24

What is the function of the Data Link layer in the OSI model?

a) To manage data encryption
b) To handle physical addressing and error detection
c) To route data between networks
d) To control data flow

Correct Answer: b) To handle physical addressing and error detection

Explanation: The Data Link layer manages MAC addresses and ensures error detection in transmitted frames.

Question 25

 What wireless standard operates on both 2.4 GHz and 5 GHz frequencies?

a) 802.11a
b) 802.11b
c) 802.11g
d) 802.11n

Correct Answer: d) 802.11n

Explanation: 802.11n supports both 2.4 GHz and 5 GHz frequencies for wireless communication.

Question 26

Which command is used to view network connections in real-time on a Windows computer?

a) nslookup
b) ping
c) netstat
d) ipconfig

Correct Answer: c) netstat

Explanation: The netstat command displays active network connections and their status in real-time.

Question 27

 What does IP stand for in networking?

a) Internet Protocol
b) Internet Protection
c) Internal Program
d) Information Packet

Correct Answer: a) Internet Protocol

Explanation: IP (Internet Protocol) is responsible for addressing and routing data across networks.

Question 28

What is a subnet mask used for?

a) To assign IP addresses
b) To route data between networks
c) To divide a network into smaller sub-networks
d) To monitor network traffic

Correct Answer: c) To divide a network into smaller sub-networks

Explanation: A subnet mask divides an IP address into the network and host portions, allowing for the creation of smaller subnetworks.

Question 29

Which OSI layer is responsible for packet sequencing and data segmentation?

a) Application
b) Transport
c) Data Link
d) Network

Correct Answer: b) Transport

Explanation: The Transport layer handles packet sequencing, segmentation, and reassembly to ensure reliable data transmission.

Question 30

What is the purpose of ARP (Address Resolution Protocol)?

a) To translate domain names into IP addresses
b) To route data between networks
c) To resolve IP addresses to MAC addresses
d) To assign IP addresses

Correct Answer: c) To resolve IP addresses to MAC addresses

Explanation: ARP translates IP addresses to MAC addresses so that data can be delivered to the correct device within a local network.

Question 31

 Which device connects multiple networks and directs network traffic based on IP addresses?

a) Switch
b) Router
c) Repeater
d) Hub

Correct Answer: b) Router

Explanation: A router connects multiple networks and forwards data between them using IP addresses.

Question 32

What is the maximum theoretical data transfer rate of a CAT5e cable?

a) 100 Mbps
b) 1 Gbps
c) 10 Gbps
d) 100 Gbps

Correct Answer: b) 1 Gbps

Explanation: CAT5e cables support up to 1 Gbps (Gigabit Ethernet) data transfer rates over a maximum length of 100 meters.

Question 33

 What does the ping command test in networking?

a) IP address resolution
b) DNS lookup
c) Connectivity between devices
d) File transfer speed

Correct Answer: c) Connectivity between devices

Explanation: The ping command tests whether two devices on a network can communicate with each other by sending an ICMP echo request.

Question 34

Which OSI layer is responsible for managing data exchange between applications?

a) Session
b) Presentation
c) Network
d) Transport

Correct Answer: a) Session

Explanation: The Session layer manages communication sessions, establishing, maintaining, and terminating connections between applications.

Question 35

What is the function of a proxy server in a network?

a) To manage IP addresses
b) To encrypt data
c) To act as an intermediary between a client and a server
d) To monitor network traffic

Correct Answer: c) To act as an intermediary between a client and a server

Explanation: A proxy server acts as an intermediary between a client and a server, often used to improve security or load balancing.

Question 36

Which network topology connects all devices to a single central point?

a) Star
b) Ring
c) Bus
d) Mesh

Correct Answer: a) Star

Explanation: In a star topology, all devices are connected to a central hub or switch.

Question 37

What type of attack involves pretending to be someone else to gain unauthorized access?

a) Phishing
b) Spoofing
c) Denial of Service
d) Man-in-the-middle

Correct Answer: b) Spoofing

Explanation: Spoofing is a technique where an attacker pretends to be someone else to gain unauthorized access to a system or data.

Question 38

What is the function of a switch in a network?

a) To connect multiple networks
b) To broadcast data to all devices
c) To forward data to the correct device based on MAC addresses
d) To encrypt data

Correct Answer: c) To forward data to the correct device based on MAC addresses

Explanation: A switch forwards data based on MAC addresses, ensuring it is sent only to the intended device.

Question 39

What is the purpose of port forwarding in a router?

a) To block unauthorized access
b) To allow external devices to access internal network services
c) To encrypt data transmissions
d) To filter network traffic

Correct Answer: b) To allow external devices to access internal network services

Explanation: Port forwarding directs traffic from external devices to specific internal network services, such as a web server.

Question 40

What is a VPN used for in networking?

a) To monitor network activity
b) To block unauthorized access
c) To provide secure remote access over the internet
d) To assign IP addresses

Correct Answer: c) To provide secure remote access over the internet

Explanation: A VPN (Virtual Private Network) provides a secure, encrypted connection for users accessing a network remotely over the internet.

Complete the Captcha to view next question set.

Prev Post
WGU D315 Practice Exam Questions – Set 3 – Part 1
Next Post
WGU D315 Practice Exam Questions – Set 3 – Part 3