OA Exams

  • web.groovymark@gmail.com
  • December 3, 2024

Question 21

A company is expanding its network and needs to ensure that only authorized devices can connect to its wireless network. Which of the following would best meet this requirement?

a) WPA2-PSK
b) WEP
c) Open network
d) MAC address filtering

Correct Answer: a) WPA2-PSK

Explanation: WPA2-PSK provides secure encryption and ensures that only authorized users with the correct pre-shared key can access the network.

Question 22

A network technician is troubleshooting an issue where users cannot access certain external websites. Upon investigation, the technician discovers that all requests to these websites are being blocked. What is the most likely cause of this issue?

a) Incorrect DNS settings
b) Firewall rules
c) Faulty switch
d) Cable failure

Correct Answer: b) Firewall rules

Explanation: Firewall rules can block specific websites or IP ranges, preventing access to those sites from within the network.

Question 23

Which of the following protocols is responsible for resolving IP addresses to MAC addresses?

a) ARP
b) DHCP
c) DNS
d) ICMP

Correct Answer: a) ARP

Explanation: ARP (Address Resolution Protocol) is used to map IP addresses to MAC addresses in a local area network.

Question 24

 What type of cabling should a network technician install to ensure the network is protected from electromagnetic interference (EMI) in an industrial environment?

a) UTP
b) STP
c) Coaxial
d) Fiber optic

Correct Answer: d) Fiber optic

Explanation: Fiber optic cabling is immune to electromagnetic interference, making it ideal for environments with high EMI.

Question 25

Which of the following is a characteristic of a stateful firewall?

a) Tracks the state of network connections
b) Filters traffic based on IP address only
c) Filters traffic at the application layer
d) Does not keep track of connection states

Correct Answer: a) Tracks the state of network connections

Explanation: Stateful firewalls track the state of active connections and make decisions based on the context of the traffic.

Question 26

 A technician needs to install a new VoIP phone system in a company. Which of the following network services should be configured to ensure voice traffic is prioritized?

a) STP
b) NAT
c) QoS
d) VLAN

Correct Answer: c) QoS

Explanation: Quality of Service (QoS) is used to prioritize certain types of traffic, such as voice, over other types to ensure reliable communication.

Question 27

 What is the primary purpose of VLANs in a network?

a) Increase wireless coverage
b) Segment a network for security and traffic management
c) Reduce the number of IP addresses required
d) Improve the speed of data transfer

Correct Answer: b) Segment a network for security and traffic management

Explanation: VLANs are used to logically segment a network to improve security and manage network traffic more effectively.

Question 28

Which of the following ports is used by HTTPS?

a) 80
b) 21
c) 443
d) 25

Correct Answer: c) 443

Explanation: HTTPS uses TCP port 443 for secure web traffic.

Question 29

 A network administrator wants to prevent unauthorized devices from accessing the network by requiring authentication for devices connected to a switch. Which protocol should the administrator use?

a) STP
b) SNMP
c) 802.1X
d) DHCP

Correct Answer: c) 802.1X

Explanation: 802.1X is used for port-based authentication, ensuring that only authorized devices can access the network.

Question 30

Which command can be used on a Windows machine to release and renew the DHCP lease?

a) ifconfig
b) ping
c) tracert
d) ipconfig

Correct Answer: d) ipconfig

Explanation: The ipconfig command in Windows is used to release and renew DHCP leases, along with displaying network configuration.

Question 31

Which of the following technologies allows for the tunneling of IPv6 traffic over an IPv4 network?

a) RIP
b) SLAAC
c) 6to4
d) ICMP

Correct Answer: c) 6to4

Explanation: 6to4 is a tunneling method that allows IPv6 traffic to be transmitted over an IPv4 network.

Question 32

A network administrator needs to assign IP addresses to several new devices on a network but does not want to assign them manually. What service should the administrator configure?

a) DNS
b) ARP
c) DHCP
d) SNMP

Correct Answer: c) DHCP

Explanation: DHCP automatically assigns IP addresses to devices on a network.

Question 33

Which of the following is used to prevent loops in a network?

a) VLAN
b) ARP
c) STP
d) DHCP

Correct Answer: c) STP

Explanation: Spanning Tree Protocol (STP) is used to prevent loops in Ethernet networks by disabling redundant links.

Question 34

Which type of cable is commonly used for high-speed data transmission over short distances in a data center environment?

a) Coaxial
b) UTP
c) STP
d) Fiber optic

Correct Answer: d) Fiber optic

Explanation: Fiber optic cables are often used for high-speed data transmission in data centers due to their high bandwidth and resistance to interference.

Question 35

 Which of the following IP address ranges is reserved for documentation and example purposes?

a) 192.168.0.0/24
b) 198.51.100.0/24
c) 172.16.0.0/12
d) 224.0.0.0/4

Correct Answer: b) 198.51.100.0/24

Explanation: The range 198.51.100.0/24 is reserved for documentation and examples, as specified by RFC 5737.

Question 36

 A company is setting up a wireless network that must support high data rates and operate on the 5 GHz band. Which of the following wireless standards should the company implement?

a) 802.11b
b) 802.11g
c) 802.11n
d) 802.11ac

Correct Answer: d) 802.11ac

Explanation: 802.11ac operates on the 5 GHz band and supports higher data rates compared to older wireless standards.

Question 37

 Which of the following routing protocols is a distance-vector protocol and uses hop count as its primary metric?

a) OSPF
b) BGP
c) RIP
d) EIGRP

Correct Answer: c) RIP

Explanation: RIP (Routing Information Protocol) is a distance-vector protocol that uses hop count to determine the best route.

Question 38

Which protocol is responsible for converting a public IP address into a private IP address when communicating with external networks?

a) DNS
b) ARP
c) NAT
d) ICMP

Correct Answer: c) NAT

Explanation: NAT (Network Address Translation) is responsible for converting private IP addresses into public IP addresses for communication with external networks.

Question 39

Which command is used to display the routing table on a Linux machine?

a) ping
b) traceroute
c) netstat
d) route

Correct Answer: d) route

Explanation: The route command is used to display or modify the routing table on a Linux machine.

Question 40

What is the maximum size of a standard Ethernet frame, excluding the preamble?

a) 1500 bytes
b) 1518 bytes
c) 1600 bytes
d) 9000 bytes

Correct Answer: b) 1518 bytes

Explanation: The maximum size of a standard Ethernet frame, excluding the preamble, is 1518 bytes, which includes the Ethernet header and trailer.

Complete the Captcha to view next question set.

Prev Post
WGU D356 Practice Exam Questions – Set 4 – Part 3
Next Post
WGU D325 Practice Exam Questions – Set 2 – Part 3