OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • December 3, 2024

Question 01

A network architect analyzes the software-defined networking model and reviews the layer that applies the business logic to decide how to prioritize traffic, secure data, and where to switch data. What is the appropriate layer for this description?

a) Application layer
b) Data link layer
c) Control layer
d) Transport layer

Correct Answer: a) Application layer

Explanation: The Application layer in SDN (Software Defined Networking) applies business logic and decides how to prioritize, secure, and switch traffic.

Question 02

When configuring connectivity with a virtual switch that bridges the virtual and physical networks via the host computer’s physical NIC, a network engineer creates a virtual switch that binds to the host’s NIC to allow the VM to communicate on the physical network. What switch did the network engineer create?

a) Internal
b) External
c) Private
d) Hybrid

Correct Answer: b) External

Explanation: An external virtual switch binds to the host's physical NIC to enable virtual machines to communicate with the physical network.

Question 03

While looking for a cloud deployment model for business operations, the network specialist looks for a model that a third party hosts for the organization’s exclusive use. Which cloud deployment model meets the network specialist’s and businesses’ needs?

a) Public
b) Private
c) Hybrid
d) Hosted Private

Correct Answer: d) Hosted Private

Explanation: A hosted private cloud is managed by a third party but is exclusively for a single organization's use.

Question 04

A network consultant is considering what technologies to use when adding a storage area network (SAN). What are the two most popular SAN connection types? (Select all that apply.)

a) Fibre Channel
b) iSCSI
c) SATA
d) USB

Correct Answer: a) Fibre Channel, b) iSCSI

Explanation: Fibre Channel and iSCSI are the two most commonly used technologies for SAN connections.

Question 05

While looking for a cloud service model for business, the network specialist looks for a model that allows the organization to rent components and internet links on an as-needed basis from the service provider’s data center. Which cloud service model meets the network specialist’s and businesses’ needs?

a) Platform as a Service
b) Software as a Service
c) Infrastructure as a Service
d) Database as a Service

Correct Answer: c) Infrastructure as a Service

Explanation: Infrastructure as a Service (IaaS) allows businesses to rent computing infrastructure, including network links and components, as needed.

Question 06

You are configuring a point-to-point link between two routers and have been assigned an IP of 77.81.12.14/30. What is the network ID associated with this IP assignment?

a) 77.81.12.10
b) 77.81.12.12
c) 77.81.12.13
d) 77.81.12.16

Correct Answer: b) 77.81.12.12

Explanation: A /30 subnet mask gives a block size of 4, and the network ID for this range would be 77.81.12.12.

Question 07

What is the network ID associated with the host located at 192.168.0.123/29?

a) 192.168.0.120
b) 192.168.0.124
c) 192.168.0.122
d) 192.168.0.126

Correct Answer: a) 192.168.0.120

Explanation: With a /29 subnet mask, the network ID for this host would be 192.168.0.120.

Question 08

Rick is configuring a Windows computer to act as a jump box on his network. He implements static routing to control the networks and systems the jump box communicates with. Which of the following commands did he use to configure this on the Windows machine?

a) route
b) netsh
c) arp
d) tracert

Correct Answer: a) route

Explanation: The "route" command is used to configure static routes on a Windows computer.

Question 09

You are trying to select the BEST network topology for a new network based on the following requirements. The design must include redundancy using a minimum of two cables to create the network. The network should not be prone to congestion, therefore each device must wait for its turn to communicate on the network by passing around a token. Which of the following topologies would BEST meet the client’s requirements?

a) Star
b) Ring
c) Mesh
d) Bus

Correct Answer: b) Ring

Explanation: In a ring topology, redundancy is built into the design, and the token-passing mechanism ensures that devices communicate without congestion.

Question 10

 An additional network segment is urgently needed for QA testing on the external network. A software release could be impacted if this change is not immediate. The request comes directly from management and was just approved through the emergency change management process. Which of the following should the technician do?

a) Make the change, document the requester, and document all network changes
b) Wait for a formal change review meeting
c) Delay the change until the scheduled maintenance window
d) Consult with the networking team for their approval

Correct Answer: a) Make the change, document the requester, and document all network changes

Explanation: In an emergency change management process, the technician should proceed with the change and ensure that all documentation is completed.

Question 11

When a criminal or government investigation is underway, what describes the identification, recovery, or exchange of electronic information relevant to that investigation?

a) Forensics
b) eDiscovery
c) Data recovery
d) Chain of custody

Correct Answer: b) eDiscovery

Explanation: eDiscovery is the process of identifying, recovering, and exchanging electronic information for legal investigations.

Question 12

Your company wants to create highly available data centers. Which of the following will allow the company to continue maintaining an Internet presence at all sites if the WAN connection at their own site goes down?

a) OSPF
b) BGP
c) RIP
d) EIGRP

Correct Answer: b) BGP

Explanation: BGP (Border Gateway Protocol) allows for highly available networks, enabling a site to maintain an Internet presence even if the WAN connection fails.

Question 13

 A system administrator wants to verify that external IP addresses cannot collect software versioning from servers on the network. Which of the following should the system administrator do to confirm the network is protected?

a) Analyze firewall logs
b) Conduct a penetration test
c) Analyze packet captures
d) Perform a vulnerability scan

Correct Answer: c) Analyze packet captures

Explanation: Analyzing packet captures will allow the administrator to see what information is being sent out and confirm if software versioning is exposed.

Question 14

 You are working as a network administrator and are worried about the possibility of an insider threat. You want to enable a security feature that would remember the Layer 2 address first connected to a particular switch port to prevent someone from unplugging a workstation from the switch port and connecting their laptop to that same switch port. Which of the following security features would BEST accomplish this goal?

a) Port mirroring
b) Port security
c) VLAN tagging
d) MAC filtering

Correct Answer: b) Port security

Explanation: Port security can remember the first MAC address connected to a switch port and prevent unauthorized devices from accessing it.

Question 15

Scott is a brand new network technician at Dion Training. He has been told to remote into the edge switch from his desk and enable DHCP snooping. Which of the following commands should he use?

a) SSH
b) FTP
c) Telnet
d) SCP

Correct Answer: c) Telnet

Explanation: Telnet is a protocol that allows remote access to network devices, though it is not as secure as SSH.

Question 16

You are installing a new LAN in a building your company just purchased. The building is older, but your company has decided to install a brand-new Cat 6a network in it before moving in. You are trying to determine whether to purchase plenum or PVC cabling. Which environmental conditions should be considered before making the purchase?

a) Ceiling height
b) Air duct placement
c) Building age
d) Number of floors

Correct Answer: b) Air duct placement

Explanation: Plenum cabling is used in areas where air circulates, such as air ducts, due to its fire-resistant properties.

Question 17

Tamera just purchased a Wi-Fi-enabled Nest Thermostat for her home. She has hired you to install it, but she is worried about a hacker breaking into the thermostat since it is an IoT device. Which of the following is the BEST thing to do to mitigate Tamera’s security concerns? (Select the best two.)

a) Configure the thermostat to connect to the wireless network using WPA2 encryption and a long, strong password
b) Configure the thermostat to use a segregated part of the network by installing it into a screened subnet
c) Disable the thermostat’s wireless functionality
d) Enable guest Wi-Fi for the thermostat

Correct Answer: a) Configure the thermostat to connect to the wireless network using WPA2 encryption and a long, strong password, b) Configure the thermostat to use a segregated part of the network by installing it into a screened subnet

Explanation: Using strong encryption and a segregated network ensures that the device is better protected from hackers.

Question 18

Andy is a network technician who is preparing to configure a company’s network. He has installed a firewall to segment his network into an internal network, a DMZ or screen subnet, and an external network. No hosts on the internal network should be directly accessible by their IP address from the Internet, but they should be able to reach remote networks if they have been assigned an IP address within the network. Which of the following IP addressing solutions would work for this particular network configuration?

a) NAT
b) Public IP addressing
c) Anycast addressing
d) Global unicast addressing

Correct Answer: a) NAT

Explanation: NAT (Network Address Translation) allows internal hosts to access external networks without exposing their private IP addresses

Question 19

What is the lowest layer (bottom layer) of a bare-metal virtualization environment?

a) Hypervisor
b) Control plane
c) Guest OS
d) Physical hardware

Correct Answer: d) Physical hardware

Explanation: In a bare-metal virtualization environment, the physical hardware is the lowest layer, on top of which the hypervisor runs.

Question 20

Which of the following technologies could be used to ensure that users who log in to a network are physically in the same building as the network they are attempting to authenticate on? (Select the best two.)

a) GPS location
b) NAC
c) MAC filtering
d) VLAN tagging

Correct Answer: a) GPS location, b) NAC

Explanation: GPS location can verify a user's physical location, while NAC (Network Access Control) can ensure compliance with network policies.

Complete the Captcha to view next question set.

Prev Post
WGU D356 Practice Exam Questions – Set 4 – Part 2
Next Post
WGU D356 Practice Exam Questions – Set 4 – Part 3