OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • December 4, 2024

Question 01

Which protocol is responsible for assigning IP addresses automatically to devices on a network?

a) DNS
b) DHCP
c) FTP
d) SNMP

Correct Answer: b) DHCP

Explanation: DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to devices on a network.

Question 02

Which of the following devices operates at the data link layer (Layer 2) of the OSI model?

a) Router
b) Switch
c) Firewall
d) Hub

Correct Answer: b) Switch

Explanation: Switches operate at Layer 2 (Data Link layer) of the OSI model and manage data flow between devices.

Question 03

What is the purpose of Network Address Translation (NAT) in a network?

a) To assign MAC addresses
b) To filter IP traffic
c) To translate private IP addresses into public IP addresses
d) To prevent routing loops

Correct Answer: c) To translate private IP addresses into public IP addresses

Explanation: NAT translates private IP addresses used in a local network into public IP addresses for internet communication.

Question 04

A technician needs to remotely manage a router securely. Which protocol should be used?

a) Telnet
b) FTP
c) SSH
d) SNMP

Correct Answer: c) SSH

Explanation: SSH (Secure Shell) provides secure remote management of network devices, including routers.

Question 05

Which of the following addresses is used for broadcast traffic within a local subnet?

a) 192.168.1.1
b) 127.0.0.1
c) 0.0.0.0
d) 255.255.255.255

Correct Answer: d) 255.255.255.255

Explanation: 255.255.255.255 is the broadcast address for sending traffic to all devices within the local subnet.

Question 06

 What type of attack involves overwhelming a network or system with excessive traffic to cause service disruption?

a) Phishing
b) Man-in-the-middle
c) DDoS
d) Spoofing

Correct Answer: c) DDoS

Explanation: DDoS (Distributed Denial of Service) attacks involve overwhelming a network or system with traffic to cause service outages.

Question 07

 Which protocol is used to securely transfer files between a client and server?

a) FTP
b) TFTP
c) SFTP
d) POP3

Correct Answer: c) SFTP

Explanation: SFTP (Secure File Transfer Protocol) is used to transfer files securely over a network.

Question 08

A network administrator needs to monitor network traffic in real time. Which tool should be used?

a) Wireshark
b) nslookup
c) traceroute
d) ping

Correct Answer: a) Wireshark

Explanation: Wireshark is a tool used to capture and analyze network traffic in real time.

Question 09

What is the maximum number of usable host addresses in a subnet with a subnet mask of 255.255.255.240 (/28)?

a) 14
b) 16
c) 30
d) 62

Correct Answer: a) 14

Explanation: A /28 subnet allows for 16 addresses, but 2 addresses are reserved for network and broadcast, leaving 14 usable host addresses.

Question 10

Which protocol is used to provide email retrieval from a remote server?

a) SMTP
b) IMAP
c) FTP
d) DHCP

Correct Answer: b) IMAP

Explanation: IMAP (Internet Message Access Protocol) allows users to retrieve email from a remote server while keeping the messages on the server.

Question 11

What feature of routers enables the connection between two or more different IP networks?

a) Switching
b) NAT
c) Routing
d) VLAN

Correct Answer: c) Routing

Explanation: Routers connect multiple IP networks by determining the best path for data packets to travel.

Question 12

Which of the following wireless security protocols is considered the weakest and should not be used?

a) WPA2
b) WPA3
c) WEP
d) 802.1x

Correct Answer: c) WEP

Explanation: WEP (Wired Equivalent Privacy) is an outdated and insecure wireless encryption protocol.

Question 13

Which type of address is used to communicate with all devices on a local network?

a) Unicast
b) Multicast
c) Broadcast
d) Anycast

Correct Answer: c) Broadcast

Explanation: A broadcast address is used to send traffic to all devices on the local network.

Question 14

What type of cable is commonly used for high-speed data transfer over long distances?

a) Coaxial
b) Fiber optic
c) Twisted pair
d) Serial

Correct Answer: b) Fiber optic

Explanation: Fiber optic cables are commonly used for long-distance, high-speed data transfer due to their immunity to electromagnetic interference.

Question 15

Which of the following is a primary function of a firewall?

a) Assigning IP addresses
b) Filtering network traffic
c) Monitoring performance
d) Encrypting data

Correct Answer: b) Filtering network traffic

Explanation: Firewalls filter incoming and outgoing network traffic based on security rules.

Question 16

What device is used to extend a network segment and reduce the number of collision domains?

a) Switch
b) Repeater
c) Bridge
d) Hub

Correct Answer: c) Bridge

Explanation: Bridges are used to divide network segments, reducing the number of collisions by creating separate collision domains.

Question 17

Which of the following IP addresses is reserved for a loopback test?

a) 192.168.1.1
b) 10.0.0.1
c) 127.0.0.1
d) 0.0.0.0

Correct Answer: c) 127.0.0.1

Explanation: The loopback address 127.0.0.1 is used for testing network interfaces on a local device.

Question 18

Which protocol allows multiple devices to share a single IP address when connecting to the internet?

a) DHCP
b) DNS
c) NAT
d) SNMP

Correct Answer: c) NAT

Explanation: NAT (Network Address Translation) allows multiple devices on a local network to share a single public IP address.

Question 19

What is the purpose of VLANs in a network?

a) To provide internet access
b) To create multiple physical networks
c) To divide a network into logical segments
d) To route traffic between different networks

Correct Answer: c) To divide a network into logical segments

Explanation: VLANs (Virtual Local Area Networks) allow network administrators to segment a network logically, even if devices share the same physical infrastructure.

Question 20

A network administrator wants to prevent unauthorized access to network devices. Which authentication method should be used?

a) LDAP
b) SNMP
c) HTTP
d) Telnet

Correct Answer: a) LDAP

Explanation: LDAP (Lightweight Directory Access Protocol) is commonly used for authenticating users and devices in a network.

Complete the Captcha to view next question set.

Prev Post
WGU D329 Practice Exam Questions – Set 4 – Part 3
Next Post
WGU D329 Practice Exam Questions – Set 5 – Part 1