OA Exams

  • web.groovymark@gmail.com
  • November 24, 2024

Question 21

 What is the primary function of a proxy server?

a) To filter and control network traffic
b) To assign IP addresses
c) To resolve domain names
d) To route packets between networks

Correct Answer: a) To filter and control network traffic

Explanation: A proxy server acts as an intermediary, filtering network traffic and improving security by hiding the client’s identity.

Question 22

Which protocol is used for sending emails?

a) FTP
b) DNS
c) SMTP
d) HTTP

Correct Answer: c) SMTP

Explanation: SMTP (Simple Mail Transfer Protocol) is the standard protocol used for sending emails across the internet.

Question 23

What type of cable is used for high-speed data transmission over long distances?

a) Twisted pair
b) Coaxial
c) Fiber optic
d) CAT5

Correct Answer: c) Fiber optic

Explanation: Fiber optic cables use light to transmit data over long distances at very high speeds, making them ideal for high-bandwidth communication.

Question 24

What is the function of a MAC address in networking?

a) It identifies the network location of a device
b) It encrypts data during transmission
c) It uniquely identifies devices on a local network
d) It assigns IP addresses to devices

Correct Answer: c) It uniquely identifies devices on a local network

Explanation: A MAC (Media Access Control) address is a unique identifier assigned to each network interface for communication within a local network.

Question 25

Which of the following is a characteristic of a mesh topology?

a) All devices are connected to a central hub
b) Devices are connected in a linear sequence
c) Every device is connected to every other device
d) Devices are connected in a loop

Correct Answer: c) Every device is connected to every other device

Explanation: In a mesh topology, all devices are interconnected, providing high redundancy and reliability.

Question 26

Which layer of the OSI model is responsible for data compression and encryption?

a) Physical
b) Presentation
c) Session
d) Transport

Correct Answer: b) Presentation

Explanation: The Presentation layer (Layer 6) handles the formatting, compression, and encryption of data to ensure it is readable by the receiving system.

Question 27

What is the function of a DHCP server?

a) To resolve domain names
b) To assign dynamic IP addresses to devices
c) To filter network traffic
d) To establish VPN connections

Correct Answer: b) To assign dynamic IP addresses to devices

Explanation: A DHCP (Dynamic Host Configuration Protocol) server automatically assigns IP addresses to devices on a network, simplifying network management.

Which type of malware disguises itself as legitimate software?

a) Worm
b) Virus
c) Trojan horse
d) Spyware

Correct Answer: c) Trojan horse

Explanation: A Trojan horse is malware that pretends to be a legitimate application while secretly performing malicious activities on the system.

Question 29

What is the main purpose of a VLAN (Virtual Local Area Network)?

a) To separate network devices physically
b) To divide a network into smaller, logical segments
c) To encrypt data transmissions
d) To assign static IP addresses

Correct Answer: b) To divide a network into smaller, logical segments

Explanation: VLANs allow network administrators to segment a network logically, improving security and traffic management.

Question 30

 Which OSI layer is responsible for routing packets between different networks?

a) Data Link
b) Network
c) Transport
d) Application

Correct Answer: b) Network

Explanation: The Network layer (Layer 3) is responsible for determining the best path to route packets across different networks, using logical addressing like IP addresses.

Question 31

Which of the following is a disadvantage of a bus topology?

a) High cabling costs
b) Difficulty in troubleshooting
c) Redundancy issues
d) High latency

Correct Answer: b) Difficulty in troubleshooting

Explanation: In a bus topology, if there is a failure in the main cable, the entire network is affected, making it difficult to troubleshoot and fix.

Question 32

Which protocol is used to access a remote device securely over the internet?

a) Telnet
b) FTP
c) SSH
d) HTTP

Correct Answer: c) SSH

Explanation: SSH (Secure Shell) allows secure access to remote devices over the internet by encrypting communication between the client and the server.

Question 33

Which network device operates at Layer 2 of the OSI model and forwards frames based on MAC addresses?

a) Hub
b) Switch
c) Router
d) Firewall

Correct Answer: b) Switch

Explanation: A switch operates at the Data Link layer (Layer 2) and forwards data based on MAC addresses, ensuring data is sent to the correct device.

Question 34

What is a firewall rule that blocks all incoming traffic by default and only allows specific traffic through called?

a) Blacklist
b) Whitelist
c) NAT
d) Proxy

Correct Answer: b) Whitelist

Explanation: A whitelist is a security approach where only pre-approved traffic is allowed through the firewall, blocking all other traffic by default.

Question 35

What is the primary purpose of a subnet mask?

a) To encrypt network traffic
b) To divide an IP address into network and host portions
c) To assign dynamic IP addresses
d) To route packets across networks

Correct Answer: a) To connect an Azure App Service to an on-premises resource over TCP

Explanation: Azure App Service Hybrid Connections allows you to connect Azure App Services to on-premises resources, such as databases, over TCP.

Question 36

Which type of cable is used to connect similar devices, such as switch-to-switch?

a) Cross-over cable
b) Patch cable
c) Fiber optic cable
d) Coaxial cable

Correct Answer: a) Cross-over cable

Explanation: A cross-over cable is used to connect two similar devices, such as switch-to-switch or computer-to-computer, by reversing the transmission and receiving wires.

Question 37

Which wireless technology provides the fastest data transmission speed?

a) 802.11a
b) 802.11b
c) 802.11g
d) 802.11ac

Correct Answer: d) 802.11ac

Explanation: The 802.11ac wireless standard provides the fastest data transmission speed, supporting gigabit speeds over short distances.

Question 38

 What is the primary function of a router?

a) To forward data based on IP addresses
b) To filter network traffic
c) To assign IP addresses
d) To connect devices in a local network

Correct Answer: a) To forward data based on IP addresses

Explanation: A router forwards data packets between different networks based on IP addresses, ensuring data reaches its intended destination.

Question 39

Which protocol is responsible for ensuring the reliability of data transmission by managing retransmissions?

a) TCP
b) UDP
c) ICMP
d) ARP

Correct Answer: a) TCP

Explanation: TCP (Transmission Control Protocol) ensures the reliable delivery of data by managing retransmissions in case of packet loss or errors.

Question 40

Which of the following is a private IP address?

a) 192.168.1.1
b) 172.15.0.1
c) 8.8.8.8
d) 128.0.0.1

Correct Answer: a) 192.168.1.1

Explanation: 192.168.x.x is a private IP address range used for local networks, not routable on the internet.

Complete the Captcha to view next question set.

Prev Post
WGU D315 Practice Exam Questions – Set 5 – Part 1
Next Post
WGU D315 Practice Exam Questions – Set 5 – Part 3