OA Exams

  • web.groovymark@gmail.com
  • November 24, 2024

Question 21

Which wireless frequency band offers greater range but slower speeds?

a) 2.4 GHz
b) 5 GHz
c) 10 GHz
d) 15 GHz

Correct Answer: a) 2.4 GHz

Explanation: The 2.4 GHz band offers longer range but slower speeds compared to the 5 GHz band, which provides faster speeds but a shorter range.

Question 22

 What does ICMP stand for?


a) Internet Control Message Protocol
b) Internet Configuration Management Protocol
c) Internal Communication Management Protocol
d) Internet Connection Monitoring Protocol

Correct Answer: a) Internet Control Message Protocol

Explanation: ICMP is used for sending error messages and operational information, such as with the ping command.

Question 23

What is the purpose of port forwarding in a router?

a) To block unauthorized access
b) To monitor network traffic
c) To allow external access to specific internal devices
d) To assign IP addresses

Correct Answer: c) To allow external access to specific internal devices

Explanation: Port forwarding directs external traffic to a specific internal device or service, such as a web server.

Question 24

Which OSI layer is responsible for routing data between different networks?

a) Application
b) Transport
c) Network
d) Physical

Correct Answer: c) Network

Explanation: The Network layer is responsible for logical addressing and routing data across different networks.

Question 25

 What does NAT (Network Address Translation) do?

a) Translates domain names into IP addresses
b) Converts private IP addresses into public IP addresses
c) Encrypts network traffic
d) Assigns MAC addresses to devices

Correct Answer: b) Converts private IP addresses into public IP addresses

Explanation: NAT converts private internal IP addresses into public IP addresses, allowing devices on a private network to access external networks like the internet.

Question 26

Which command would you use to trace the route packets take to reach a destination?


a) ping
b) traceroute
c) netstat
d) nslookup

Correct Answer: b) traceroute

Explanation: The traceroute command shows the path packets take from the source to the destination, listing all intermediate hops along the way.

Question 27

Which network topology provides the highest level of fault tolerance?

a) Star
b) Ring
c) Mesh
d) Bus

Correct Answer: c) Mesh

Explanation: In a mesh topology, each device is connected to every other device, offering high redundancy and fault tolerance.

Question 28

Which protocol is used for secure communication over the internet?


a) FTP
b) HTTP
c) HTTPS
d) SNMP

Correct Answer: c) HTTPS

Explanation: HTTPS (Hypertext Transfer Protocol Secure) is used for secure communication over the internet by encrypting data between the client and server.

Question 29

What is the primary purpose of a proxy server?

a) To encrypt network traffic
b) To monitor network traffic
c) To act as an intermediary between a client and server
d) To assign IP addresses

Correct Answer: c) To act as an intermediary between a client and server

Explanation: Proxy servers act as intermediaries between clients and servers, often used to enhance security or control access.

Question 30

Which layer of the OSI model is responsible for error detection and correction?


a) Physical
b) Data Link
c) Network
d) Presentation

Correct Answer: b) Data Link

Explanation: The Data Link layer ensures data is transmitted error-free across the physical network by handling error detection and correction.

Question 31

What type of cable is commonly used for Ethernet networking?

a) Coaxial
b) Fiber-optic
c) Twisted pair
d) HDMI

Correct Answer: c) Twisted pair

Explanation: Twisted pair cables, such as CAT5e and CAT6, are commonly used for Ethernet networking due to their balance of speed, range, and cost.

Question 32

What is the purpose of a honeypot in network security?

a) To encrypt sensitive data
b) To attract attackers and study their behavior
c) To monitor network performance
d) To filter network traffic

Correct Answer: b) To attract attackers and study their behavior

Explanation: A honeypot is a decoy system used to attract attackers and analyze their actions without putting real network resources at risk.

Question 33

What does SSL stand for in secure communications?

a) Secure Sockets Layer
b) Secure System Layer
c) System Security Layer
d) Socket Secure Layer

Correct Answer: a) Secure Sockets Layer

Explanation: SSL (Secure Sockets Layer) is a protocol used to establish secure connections between web servers and browsers, ensuring data is encrypted.

Question 34

What type of attack involves overwhelming a system with traffic to render it unavailable?

a) Phishing
b) Man-in-the-middle
c) Denial of Service
d) Spoofing

Correct Answer: c) Denial of Service

Explanation: A Denial of Service (DoS) attack floods a system with traffic, making it unavailable to legitimate users.

Question 35

Which OSI layer is responsible for data formatting and encryption?

a) Application
b) Session
c) Presentation
d) Network

Correct Answer: c) Presentation

Explanation: The Presentation layer is responsible for data formatting, encryption, and compression, ensuring data is presented correctly to applications.

Question 36

What does DHCP stand for?


a) Data Host Control Protocol
b) Domain Host Configuration Protocol
c) Dynamic Host Configuration Protocol
d) Dynamic Hyper Control Protocol

Correct Answer: c) Dynamic Host Configuration Protocol

Explanation: DHCP dynamically assigns IP addresses and other network configuration settings to devices on a network.

Question 37

What is the primary function of a switch in a network?


a) To broadcast data to all devices
b) To forward data only to the intended device based on MAC addresses
c) To route data between different networks
d) To encrypt network traffic

Correct Answer: b) To forward data only to the intended device based on MAC addresses

Explanation: A switch forwards data only to the correct device on the network by using MAC addresses to make forwarding decisions.

Question 38

Which protocol is responsible for resolving domain names into IP addresses?

a) DNS
b) DHCP
c) ARP
d) ICMP

Explanation: DNS (Domain Name System) resolves domain names (such as www.example.com) into IP addresses, allowing devices to locate each other on the network.

Question 39

What is the purpose of a MAC address?


a) To identify devices on a network at the physical layer
b) To assign IP addresses to devices
c) To encrypt network traffic
d) To route data between networks

Correct Answer: a) To identify devices on a network at the physical layer

Explanation: MAC addresses are unique hardware identifiers assigned to network devices, used to ensure proper data delivery at the Data Link layer.

Question 40

What is a man-in-the-middle attack?

a) An attack where a hacker intercepts and alters communication between two parties
b) An attack that floods a server with requests
c) An attack that sends phishing emails to obtain sensitive information
d) An attack that spoofs the IP address of a legitimate server

Correct Answer: a) An attack where a hacker intercepts and alters communication between two parties

Explanation: In a man-in-the-middle attack, the attacker intercepts and possibly alters communication between two parties without their knowledge.

Complete the Captcha to view next question set.

Prev Post
WGU D315 Practice Exam Questions – Set 4 – Part 1
Next Post
WGU D315 Practice Exam Questions – Set 4 – Part 3