OA Exams

  • web.groovymark@gmail.com
  • December 3, 2024

Question 21

 Which of the following methods is used by IPv6 to allow a host to automatically assign an IP address without a DHCP server?

a) APIPA
b) SLAAC
c) NAT
d) Static addressing

Correct Answer: b) SLAAC

Explanation: SLAAC (Stateless Address Autoconfiguration) allows IPv6 devices to configure their own IP addresses without the need for a DHCP server.

Question 22

 What type of network device combines the features of a switch and a wireless access point?

a) Router
b) Bridge
c) Hub
d) Wireless router

Correct Answer: d) Wireless router

Explanation: A wireless router combines the functionality of a switch for wired devices and a wireless access point for wireless devices.

Question 23

Which of the following is used to detect and prevent unauthorized access to a wireless network?

a) WPA2
b) HTTP
c) NAT
d) FTP

Correct Answer: a) WPA2

Explanation: WPA2 (Wi-Fi Protected Access 2) is a security protocol used to protect wireless networks from unauthorized access.

Question 24

A technician needs to prioritize voice traffic over other types of traffic on a network. Which feature should be implemented to achieve this?

a) NAT
b) DHCP
c) QoS
d) DNS

Correct Answer: c) QoS

Explanation: QoS (Quality of Service) is used to prioritize certain types of network traffic, such as voice or video, over other traffic.

Question 25

What type of cable is used for high-speed, long-distance connections and is immune to electromagnetic interference?

a) Coaxial cable
b) Twisted-pair cable
c) Fiber optic cable
d) Serial cable

Correct Answer: c) Fiber optic cable

Explanation: Fiber optic cables are used for high-speed, long-distance connections and are immune to electromagnetic interference.

Question 26

Which protocol is used to synchronize time across devices on a network?

a) SNMP
b) NTP
c) SMTP
d) DHCP

Correct Answer: b) NTP

Explanation: NTP (Network Time Protocol) is used to synchronize time across network devices.

Question 27

Which of the following commands can be used to trace the path that packets take to a destination on a network?

a) ping
b) nslookup
c) tracert
d) ipconfig

Correct Answer: c) tracert

Explanation: tracert is used to trace the path that packets take from source to destination, showing each hop along the way.

Question 28

What feature of a switch ensures that only authorized devices can connect to the network by verifying MAC addresses?

a) VLAN
b) DHCP
c) Port security
d) QoS

Correct Answer: c) Port security

Explanation: Port security is used on switches to allow only authorized devices to connect by verifying their MAC addresses.

Question 29

A user reports slow network performance while working on a Wi-Fi connection. Upon investigation, the network administrator discovers many devices using the same channel. What could be done to improve performance?

a) Use a stronger encryption method
b) Change the Wi-Fi channel
c) Increase the signal strength
d) Disable SSID broadcast

Correct Answer: b) Change the Wi-Fi channel

Explanation: Changing the Wi-Fi channel can reduce interference from other devices using the same channel, improving performance.

Question 30

A company uses a web-based application that must be accessible by employees and customers from different locations. Which type of IP address should be assigned to the server hosting the application?

a) Private IP
b) Public IP
c) APIPA
d) Multicast IP

Correct Answer: b) Public IP

Explanation: A public IP address is required for a server that needs to be accessible over the internet.

Question 31

A technician needs to verify whether a specific switch port is connected to a particular device. Which command should be used on a Cisco switch to view this information?

a) show ip route
b) show vlan
c) show interfaces
d) show mac address-table

Correct Answer: d) show mac address-table

Explanation: The show mac address-table command displays the MAC addresses associated with specific switch ports.

Question 32

What is the primary advantage of using fiber optic cables over copper cables for data transmission?

a) Cost
b) Durability
c) Higher bandwidth and longer distance
d) Compatibility with existing hardware

Correct Answer: c) Higher bandwidth and longer distance

Explanation: Fiber optic cables support higher bandwidth and longer distance transmission than copper cables.

Question 33

Which of the following protocols is used to provide secure remote access to network devices?

a) FTP
b) Telnet
c) SSH
d) SNMP

Correct Answer: c) SSH

Explanation: SSH (Secure Shell) is used to provide secure remote access to network devices.

Question 34

What is the default subnet mask for a Class C IPv4 address?

a) 255.0.0.0
b) 255.255.0.0
c) 255.255.255.0
d) 255.255.255.255

Correct Answer: c) 255.255.255.0

Explanation: The default subnet mask for a Class C IPv4 address is 255.255.255.0.

Question 35

Which of the following protocols is used to send email from a client to a mail server?

a) POP3
b) SMTP
c) IMAP
d) SNMP

Correct Answer: b) SMTP

Explanation: SMTP (Simple Mail Transfer Protocol) is used to send email from a client to a mail server.

Question 36

A network administrator needs to configure a switch to prevent loops when redundant links are present. Which protocol should be enabled on the switch?

a) OSPF
b) RIP
c) STP
d) EIGRP

Correct Answer: c) STP

Explanation: STP (Spanning Tree Protocol) prevents loops in networks with redundant links.

Question 37

What type of server is responsible for translating domain names into IP addresses?

a) DHCP server
b) Web server
c) DNS server
d) Proxy server

Correct Answer: c) DNS server

Explanation: A DNS server translates domain names into IP addresses for devices to connect to websites.

Question 38

A company needs to connect multiple LANs across several branch offices. Which technology would be best suited for this?

a) WAN
b) VLAN
c) VPN
d) LAN

Correct Answer: a) WAN

Explanation: A WAN (Wide Area Network) connects multiple LANs across geographically dispersed locations.

Question 39

 A technician needs to find out the IP address configuration of a Windows machine. Which command should they use?

a) ifconfig
b) ipconfig
c) ping
d) netstat

Correct Answer: b) ipconfig

Explanation: The ipconfig command is used to view the IP address configuration of a Windows machine.

Question 40

A network engineer is troubleshooting a network issue and wants to see the active connections on a server. Which command would be most appropriate?

a) ping
b) netstat
c) tracert
d) nslookup

Correct Answer: b) netstat

Explanation: The netstat command displays active network connections on a server.

Complete the Captcha to view next question set.

Prev Post
WGU D325 Practice Exam Questions – Set 4 – Part 1
Next Post
WGU D325 Practice Exam Questions – Set 4 – Part 3