OA Exams

  • web.groovymark@gmail.com
  • December 3, 2024

Question 41

A network technician is troubleshooting an issue where a workstation is not receiving an IP address from the DHCP server. What could be a possible cause?

a) Incorrect default gateway
b) Misconfigured DNS server
c) DHCP server unavailable
d) Firewall blocking ports

Correct Answer: c) DHCP server unavailable

Explanation: If the DHCP server is unavailable, the workstation will not receive an IP address automatically.

Question 42

Which of the following routing protocols is considered a distance-vector protocol?

a) OSPF
b) EIGRP
c) RIP
d) BGP

Correct Answer: c) RIP

Explanation: RIP (Routing Information Protocol) is a distance-vector routing protocol that determines the best path based on hop count.

Question 43

A technician needs to configure a secure method for transferring large files between two remote servers. Which of the following protocols should be used?

a) FTP
b) TFTP
c) SFTP
d) HTTP

Correct Answer: c) SFTP

Explanation: SFTP (SSH File Transfer Protocol) provides secure file transfer between two remote servers using encryption.

Question 44

What is the purpose of a proxy server in a network?

a) To resolve domain names
b) To block unauthorized access to the network
c) To act as an intermediary between client devices and external services
d) To route traffic between VLANs

Correct Answer: c) To act as an intermediary between client devices and external services

Explanation: A proxy server acts as an intermediary between client devices and external services, often used to improve security or performance.

Question 45

Which of the following ports is used by the Telnet protocol?

a) 22
b) 23
c) 443
d) 3389

Correct Answer: b) 23

Explanation: Telnet operates on port 23 and is used for remote access to devices over a network, although it is not secure.

Question 46

 A technician is configuring a router to block traffic from a specific IP address. Which of the following should be configured to implement this restriction?

a) NAT
b) ACL
c) DHCP
d) DNS

Correct Answer: b) ACL

Explanation: Access Control Lists (ACLs) are used to allow or block specific traffic based on IP addresses, protocols, or ports.

Question 47

 A network administrator is setting up a wireless network and needs to ensure that only authorized users can access it. Which of the following security measures should be implemented?

a) MAC address filtering
b) Open SSID
c) WEP encryption
d) DHCP reservations

Correct Answer: a) MAC address filtering

Explanation: MAC address filtering restricts access to the wireless network by allowing only authorized devices with specific MAC addresses to connect.

Question 48

 Which of the following protocols is used for automated discovery of devices on a network?

a) SNMP
b) LLDP
c) FTP
d) HTTP

Correct Answer: b) LLDP

Explanation: LLDP (Link Layer Discovery Protocol) is used for the automated discovery of devices on a network.

Question 49

What is the primary function of a load balancer in a network?

a) To route traffic between VLANs
b) To distribute network traffic across multiple servers
c) To filter network traffic based on rules
d) To encrypt data in transi

Correct Answer: b) To distribute network traffic across multiple servers

Explanation: A load balancer distributes network traffic across multiple servers to ensure availability and improve performance.

Question 50

A network administrator is configuring a switch to assign IP addresses to clients dynamically. What feature must be enabled on the switch?

a) DNS
b) DHCP
c) SNMP
d) VLANs

Correct Answer: b) DHCP

Explanation: DHCP (Dynamic Host Configuration Protocol) assigns IP addresses dynamically to clients on a network.

Complete the Captcha to view next question set.

Prev Post
WGU D325 Practice Exam Questions – Set 3 – Part 2
Next Post
WGU D325 Practice Exam Questions – Set 4 – Part 1