OA Exams

  • web.groovymark@gmail.com
  • December 3, 2024

Question 21

Which of the following protocols is used to monitor and manage network devices?

a) SNMP
b) SMTP
c) DHCP
d) ARP

Correct Answer: a) SNMP

Explanation: SNMP (Simple Network Management Protocol) is used to monitor and manage network devices.

Question 22

A technician is setting up a DHCP server. What is the primary function of a DHCP server?

a) Assign IP addresses to clients automatically
b) Resolve domain names to IP addresses
c) Manage bandwidth allocation
d) Secure network traffic with encryption

Correct Answer: a) Assign IP addresses to clients automatically

Explanation: DHCP (Dynamic Host Configuration Protocol) is used to automatically assign IP addresses to network devices.

Question 23

Which of the following commands is used to determine the MAC address of a network interface on a Windows machine?

a) ipconfig /all
b) ping
c) nslookup
d) route print

Correct Answer: a) ipconfig /all

Explanation: The ipconfig /all command shows detailed network information, including the MAC address of each network interface.

Question 24

Which of the following is used to transmit data in small, fixed-sized cells in a network, typically over high-speed links?

a) Frame relay
b) ATM
c) MPLS
d) PPP

Correct Answer: b) ATM

Explanation: ATM (Asynchronous Transfer Mode) uses small, fixed-sized cells to transmit data over high-speed links.

Question 25

What is the default port used by HTTPS for secure web traffic?

a) 21
b) 80
c) 443
d) 25

Correct Answer: c) 443

Explanation: HTTPS (HyperText Transfer Protocol Secure) uses port 443 for secure web traffic.

Question 26

 A technician needs to check for packet loss between two points on a network. Which command should the technician use?

a) ping
b) tracert
c) nslookup
d) netstat

Correct Answer: a) ping

Explanation: The ping command sends ICMP packets and measures the response to detect packet loss and latency.

Question 27

A network administrator is implementing port security on a switch. What is the purpose of port security?

a) To prevent unauthorized devices from accessing the network
b) To encrypt traffic on the network
c) To assign VLANs to ports
d) To manage bandwidth allocation

Correct Answer: a) To prevent unauthorized devices from accessing the network

Explanation: Port security restricts access to specific MAC addresses on a switch port to prevent unauthorized devices from connecting.

Question 28

What is the purpose of a firewall in a network?

a) To allocate IP addresses to devices
b) To filter and control incoming and outgoing network traffic
c) To route traffic between VLANs
d) To connect devices within the same network

Correct Answer: b) To filter and control incoming and outgoing network traffic

Explanation: A firewall monitors and filters incoming and outgoing traffic based on predefined security rules.

Question 29

A network administrator needs to configure a server that will store and provide access to large amounts of data. Which type of server should be used?

a) Web server
b) DNS server
c) File server
d) Mail server

Correct Answer: c) File server

Explanation: A file server is used to store and provide access to large amounts of data.

Question 30

 Which of the following protocols operates at the Transport layer of the OSI model and provides reliable data delivery?

a) UDP
b) IP
c) TCP
d) ARP

Correct Answer: c) TCP

Explanation: TCP (Transmission Control Protocol) operates at the Transport layer and provides reliable, connection-oriented data delivery.

Question 31

Which of the following IPv6 address types is used to communicate with all nodes on a network segment?

a) Unicast
b) Multicast
c) Anycast
d) Broadcast

Correct Answer: b) Multicast

Explanation: IPv6 does not use broadcasts. Multicast addresses are used to send packets to multiple nodes in a group.

Question 32

Which of the following protocols is used to securely access a remote computer’s desktop over a network?

a) SSH
b) FTP
c) RDP
d) Telnet

Correct Answer: c) RDP

Explanation: RDP (Remote Desktop Protocol) is used to securely access a remote computer's desktop over a network.

Question 33

A technician is troubleshooting an IP address conflict on a network. Which of the following tools can be used to identify the MAC address associated with an IP address?

a) nslookup
b) ping
c) arp
d) tracert

Correct Answer: c) arp

Explanation: The arp command is used to map IP addresses to MAC addresses.

Question 34

Which of the following standards defines Power over Ethernet (PoE), allowing network cables to carry electrical power?

a) 802.1q
b) 802.11ac
c) 802.3af
d) 802.11n

Correct Answer: c) 802.3af

Explanation: The 802.3af standard defines Power over Ethernet (PoE), which allows network cables to carry electrical power.

Question 35

 A network technician needs to prevent loops in a network with redundant links between switches. Which protocol should be enabled on the switches?

a) RIP
b) STP
c) OSPF
d) EIGRP

Correct Answer: b) STP

Explanation: STP (Spanning Tree Protocol) prevents loops in a network with redundant links by logically blocking some paths.

Question 36

 Which of the following commands is used to display the routing table on a Linux system?

a) route
b) ipconfig
c) netstat
d) tracert

Correct Answer: a) route

Explanation: The route command is used to display and manipulate the IP routing table on a Linux system.

Question 37

A network administrator needs to configure a VLAN on a switch. What is the purpose of VLANs in a network?

a) To separate network traffic into different segments
b) To allocate bandwidth based on application priority
c) To secure the network from unauthorized access
d) To enable wireless access points

Correct Answer: a) To separate network traffic into different segments

Explanation: VLANs (Virtual Local Area Networks) separate network traffic into different segments, improving security and performance.

Question 38

A user is trying to access a website but is receiving a “Page not found” error. The network is functioning, and the IP address is correct. What might be causing the problem?

a) Incorrect IP address
b) DNS resolution failure
c) Network congestion
d) Misconfigured firewall

Correct Answer: b) DNS resolution failure

Explanation: A "Page not found" error can be caused by a DNS resolution failure, where the domain name cannot be translated to an IP address.

Question 39

A technician is installing new fiber optic cabling for a high-speed network connection. What is an advantage of using fiber optic cables over copper cables?

a) Fishbone diagram
b) Pareto chart
c) Control chart
d) Scatter diagram

Correct Answer: b) Less attenuation over long distances

Explanation: Fiber optic cables experience less attenuation over long distances and are immune to electromagnetic interference.

Question 40

Which of the following protocols is used to synchronize time between devices on a network?

a) NTP
b) FTP
c) SNMP
d) SMTP

Correct Answer: a) NTP

Explanation: NTP (Network Time Protocol) is used to synchronize time between devices on a network.

Complete the Captcha to view next question set.

Prev Post
WGU D356 Practice Exam Questions – Set 5 – Part 3
Next Post
WGU D325 Practice Exam Questions – Set 3 – Part 3