OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • December 3, 2024

Question 01

Which of the following protocols is responsible for discovering the MAC address associated with a known IP address?

a) TCP
b) ICMP
c) ARP
d) IP

Correct Answer: c) ARP

Explanation: ARP (Address Resolution Protocol) is used to map a known IP address to a MAC address on a local network.

Question 02

A network technician needs to troubleshoot a physical connection between a workstation and a switch. Which tool would best help in testing the connection?

a) Cable tester
b) Packet sniffer
c) Bandwidth monitor
d) Port scanner

Correct Answer: a) Cable tester

Explanation: A cable tester is used to test the integrity of cables, checking for faults, shorts, or miswiring.

Question 03

What type of firewall inspects incoming and outgoing packets and allows or blocks them based on preconfigured security rules?

a) Stateless firewall
b) Proxy firewall
c) Stateful firewall
d) Application firewall

Correct Answer: c) Stateful firewall

Explanation: A stateful firewall monitors the state of active connections and makes decisions based on the context of the traffic.

Question 04

A network administrator is configuring a wireless network for a business. To ensure the highest level of security, which encryption protocol should be used?

a) WEP
b) WPA2
c) WPA
d) TKIP

Correct Answer: b) WPA2

Explanation: WPA2 is currently the most secure wireless encryption protocol commonly used in networks.

Question 05

A company is expanding and needs to implement redundancy in its network to prevent downtime in case of a link failure. Which of the following can be used to prevent loops in this network design?

a) OSPF
b) RIP
c) STP
d) EIGRP

Correct Answer: c) STP

Explanation: STP (Spanning Tree Protocol) is used to prevent loops in a network with redundant links.

Question 06

 A network technician is tasked with diagnosing intermittent issues on a network. What tool would be best suited for capturing packets and analyzing them in real time?

a) Cable tester
b) Wireshark
c) Tracert
d) IP scanner

Correct Answer: b) Wireshark

Explanation: Wireshark is a packet analyzer used to capture and analyze network traffic in real time.

Question 07

Which of the following protocols allows devices to discover each other on a local network and share resources such as printers and files?

a) FTP
b) SMB
c) DNS
d) SNMP

Correct Answer: b) SMB

Explanation: SMB (Server Message Block) is a protocol that allows sharing of resources like files and printers on a local network.

Question 08

What is the function of a Content Delivery Network (CDN)?

a) To provide network security
b) To distribute web content across multiple servers for faster access
c) To assign IP addresses to devices
d) To monitor network traffic for anomalies

Correct Answer: b) To distribute web content across multiple servers for faster access

Explanation: A CDN distributes web content across multiple servers to reduce latency and improve load times for users.

Question 09

Which of the following allows a device to obtain an IP address automatically when joining a network?

a) DNS
b) DHCP
c) NAT
d) ARP

Correct Answer: b) DHCP

Explanation: DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to devices on a network.

Question 10

What is the primary purpose of a demilitarized zone (DMZ) in network architecture?

a) To isolate public-facing services from the internal network
b) To prevent DoS attacks
c) To filter traffic between VLANs
d) To create a secure virtual network

Correct Answer: a) To isolate public-facing services from the internal network

Explanation: A DMZ is used to provide an additional layer of security by isolating public-facing servers from the internal network.

Question 11

 Which command is used in Linux to display network interfaces and their configurations?

a) ipconfig
b) netstat
c) ifconfig
d) ping

Correct Answer: c) ifconfig

Explanation: The ifconfig command is used to display or configure network interfaces in Linux.

Question 12

What is the primary function of NAT (Network Address Translation)?

a) To allocate bandwidth
b) To map private IP addresses to public IP addresses for internet communication
c) To encrypt traffic on the network
d) To assign MAC addresses to devices

Correct Answer: b) To map private IP addresses to public IP addresses for internet communication

Explanation: NAT translates private IP addresses to public IP addresses, allowing devices with private IPs to communicate over the internet.

Question 13

Which of the following DNS record types is used to define the mail server responsible for receiving email for a domain?

a) A record
b) MX record
c) CNAME record
d) PTR record

Correct Answer: b) MX record

Explanation: MX (Mail Exchange) records specify the mail servers responsible for receiving email for a domain.

Question 14

A network administrator is troubleshooting why a workstation cannot reach a specific website. Which command can be used to check if the DNS server is resolving the website’s domain name to an IP address?

a) tracert
b) ipconfig
c) nslookup
d) netstat

Correct Answer: c) nslookup

Explanation: The nslookup command is used to query DNS servers and check domain name resolution.

Question 15

 What is the primary purpose of a subnet mask in an IP address configuration?

a) To encrypt data
b) To define the network and host portions of an IP address
c) To map IP addresses to MAC addresses
d) To assign IP addresses dynamically

Correct Answer: b) To define the network and host portions of an IP address

Explanation: The subnet mask defines which part of an IP address represents the network and which part represents the host.

Question 16

A network technician is tasked with setting up a secure remote connection for a user working from home. Which of the following technologies would be most appropriate for this?

a) Telnet
b) VPN
c) SSH
d) FTP

Correct Answer: b) VPN

Explanation: VPN (Virtual Private Network) provides a secure connection to a remote network over the internet.

Question 17

Which of the following protocols is used to securely transfer files over the internet?

a) FTP
b) TFTP
c) SFTP
d) HTTP

Correct Answer: c) SFTP

Explanation: SFTP (Secure File Transfer Protocol) securely transfers files over the internet using SSH encryption.

Question 18

What type of device typically operates at Layer 2 of the OSI model and forwards data based on MAC addresses?

a) Router
b) Switch
c) Firewall
d) Gateway

Correct Answer: b) Switch

Explanation: A switch operates at Layer 2 (Data Link Layer) and forwards data based on MAC addresses.

Question 19

 A technician is configuring a switch to support multiple VLANs. Which protocol is used to allow VLAN traffic to traverse between switches?

a) SNMP
b) 802.1Q
c) ARP
d) TCP

Correct Answer: b) 802.1Q

Explanation: 802.1Q is a VLAN tagging protocol that allows VLAN traffic to be carried over trunk links between switches.

Question 20

A network engineer needs to encrypt communication between two remote offices. Which of the following protocols would be the best choice for securing the connection?

a) HTTP
b) IPsec
c) FTP
d) RIP

Correct Answer: b) IPsec

Explanation: IPsec (Internet Protocol Security) is used to secure communications over IP networks by encrypting data at the network layer.

Complete the Captcha to view next question set.

Prev Post
WGU D325 Practice Exam Questions – Set 3 – Part 3
Next Post
WGU D325 Practice Exam Questions – Set 4 – Part 2