OA Exams

  • web.groovymark@gmail.com
  • November 24, 2024

Question 41

 Which wireless standard operates at both 2.4 GHz and 5 GHz frequencies?

a) 802.11b
b) 802.11g
c) 802.11n
d) 802.11a

Correct Answer: c) 802.11n

Explanation: 802.11n operates on both 2.4 GHz and 5 GHz frequency bands, offering better performance and flexibility than earlier wireless standards.

Question 42

What does the tracert command do?

a) Tests connectivity between two devices
b) Shows the path data takes from one device to another
c) Resolves IP addresses to domain names
d) Displays the network configuration of a device

Correct Answer: b) Shows the path data takes from one device to another

Explanation: The tracert command displays the route data takes from the source to the destination, showing each hop along the way.

Question 43

What is the function of a network switch?

a) To encrypt data between devices
b) To forward data to all devices on the network
c) To route data based on IP addresses
d) To forward data only to the intended recipient

Correct Answer: d) To forward data only to the intended recipient

Explanation: A switch forwards data only to the intended device on the network using MAC addresses, ensuring efficient data transmission.

Question 44

What is the primary difference between TCP and UDP?

a) TCP is faster than UDP
b) TCP is connection-oriented, while UDP is connectionless
c) UDP provides encryption, while TCP does not
d) UDP is used for email, while TCP is used for web browsing

Correct Answer: b) TCP is connection-oriented, while UDP is connectionless

Explanation: TCP establishes a connection before transmitting data, ensuring reliable delivery, while UDP is connectionless and faster but less reliable.

Question 45

What is a Denial of Service (DoS) attack?

a) An attack that floods a server with requests, making it unavailable
b) An attack that intercepts communication between two devices
c) An attack that sends phishing emails to users
d) An attack that alters DNS records to redirect traffic

Correct Answer: a) An attack that floods a server with requests, making it unavailable

Explanation: In a Denial of Service attack, the attacker floods the target with traffic, rendering it unavailable to legitimate users.

Question 46

 Which OSI layer handles encryption and decryption of data?

a) Application
b) Presentation
c) Network
d) Data Link

Correct Answer: b) Presentation

Explanation: The Presentation layer is responsible for encryption, decryption, and data formatting to ensure data is properly interpreted by applications.

Question 47

What is a network protocol?


a) A set of rules governing data communication
b) A device that forwards data between networks
c) A method for encrypting data
d) A system for assigning IP addresses

Correct Answer: a) A set of rules governing data communication

Explanation: A network protocol is a set of rules and conventions that devices use to communicate with each other across a network.

Question 48

What is the main function of a wireless access point (WAP)?

a) To assign IP addresses to devices
b) To extend the range of a wireless network
c) To connect wireless devices to a wired network
d) To monitor network traffic

Correct Answer: c) To connect wireless devices to a wired network

Explanation: A wireless access point connects wireless devices to a wired network, enabling communication between the two.

Question 49

What is the role of DNS (Domain Name System) in networking?

a) To assign IP addresses to devices
b) To translate IP addresses into MAC addresses
c) To translate domain names into IP addresses
d) To encrypt network traffic

Correct Answer: c) To translate domain names into IP addresses

Explanation: DNS translates human-readable domain names (like www.example.com) into IP addresses, allowing devices to locate each other on the internet.

Question 50

Which protocol is used to securely transfer files over the internet?

a) FTP
b) SSH
c) SFTP
d) HTTP

Correct Answer: c) SFTP

Explanation: SFTP (Secure File Transfer Protocol) is used to securely transfer files over the internet by encrypting data during transmission.

Complete the Captcha to view next question set.

Prev Post
WGU D315 Practice Exam Questions – Set 4 – Part 2
Next Post
WGU D315 Practice Exam Questions – Set 5 – Part 1