OA Exams

  • web.groovymark@gmail.com
  • November 24, 2024

Question 41

Which layer of the OSI model is responsible for logical addressing?

a) Data Link
b) Physical
c) Network
d) Transport

Correct Answer: c) Network

Explanation: The Network layer handles logical addressing, such as IP addresses, and routes data across networks.

Question 42

What type of attack sends multiple requests to a server, overwhelming it and causing it to crash?

a) Man-in-the-middle attack
b) Spoofing attack
c) Phishing attack
d) Denial of Service attack

Correct Answer: d) Denial of Service attack

Explanation: A Denial of Service (DoS) attack overwhelms a server with traffic, making it unavailable to legitimate users.

Question 43

What protocol is commonly used to transfer files between computers over a network?

a) HTTP
b) FTP
c) SSH
d) DNS

Correct Answer: b) FTP

Explanation: FTP (File Transfer Protocol) is used to transfer files between computers over a network.

Question 44

Which of the following is a type of wireless encryption protocol?

a) AES
b) SSL
c) WPA2
d) SSH

Correct Answer: c) WPA2

Explanation: WPA2 (Wi-Fi Protected Access 2) is a wireless encryption protocol used to secure Wi-Fi networks.

Question 45

What is the purpose of a honeypot in network security?

a) To monitor user activity
b) To encrypt sensitive data
c) To attract and analyze attacks
d) To block malware

Correct Answer: c) To attract and analyze attacks

Explanation: A honeypot is a decoy system designed to attract attackers and analyze their behavior without putting the real network at risk.

Question 46

Which network topology offers the most redundancy and fault tolerance?

a) Star
b) Ring
c) Bus
d) Mesh

Correct Answer: d) Mesh

Explanation: In a mesh topology, each device is connected to every other device, providing high redundancy and fault tolerance

Question 47

What is the function of the ICMP protocol?

a) To route data between networks
b) To provide reliable data transmission
c) To send error messages and operational information
d) To encrypt network traffic

Correct Answer: c) To send error messages and operational information

Explanation: ICMP (Internet Control Message Protocol) is used to send error messages and information about network conditions, such as with the ping command.

Question 48

What does a subnet mask determine in an IP address?

a) The default gateway
b) The class of the IP address
c) The division between the network and host portions of an address
d) The IP version

Correct Answer: c) The division between the network and host portions of an address

Explanation: A subnet mask determines which part of an IP address is used for the network and which part is used for the host.

Question 49

What does a DHCP server provide to a network device?

a) A MAC address
b) A hostname
c) An IP address and other network configuration
d) Encryption

Correct Answer: c) An IP address and other network configuration

Explanation: A DHCP server automatically assigns an IP address, subnet mask, gateway, and DNS server settings to devices on a network.

Question 50

Which OSI layer is responsible for establishing and maintaining connections between devices?

a) Transport
b) Data Link
c) Session
d) Presentation

Correct Answer: c) Session

Explanation: The Session layer manages and maintains connections between devices during communication.

Complete the Captcha to view next question set.

Prev Post
WGU D315 Practice Exam Questions – Set 3 – Part 2
Next Post
WGU D315 Practice Exam Questions – Set 4 – Part 1