OA Exams

  • web.groovymark@gmail.com
  • November 19, 2024

Question 21

At what OSI Layer are most LAN and WAN protocols defined?

a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 7

Correct Answer: b) Layer 2

Explanation: Most LAN and WAN protocols are defined at Layer 2 (Data Link layer), where the protocols handle the physical addressing and error checking.

Question 22

Which cellular technology is widely implemented across the globe?

a) CDMA
b) TDMA
c) GSM
d) LTE

Correct Answer: c) GSM

Explanation: GSM (Global System for Mobile Communications) is the most widely used cellular technology worldwide.

Question 23

Which type of DNS record is used for spam control?

a) A record
b) MX record
c) CNAME record
d) TXT record

Correct Answer: d) TXT record

Explanation: TXT records are used in DNS to store text information, including SPF and DKIM records for email spam control.

Question 24

What do you configure in DHCP to add the address of the default gateway and DNS server?

a) Lease options
b) Server options
c) Scope options
d) Client options

Correct Answer: c) Scope options

Explanation: In DHCP, scope options are used to define parameters such as the default gateway and DNS server for clients in the specified scope.

Question 25

What connector type is used for ordinary telephone cables?

a) RJ-11
b) RJ-45
c) BNC
d) DB-9

Correct Answer: a) RJ-11

Explanation: RJ-11 connectors are commonly used for telephone lines, while RJ-45 is used for Ethernet cables.

Question 26

Which twisted pair cable category is a cheaper alternative to using CAT 6?

a) CAT 3
b) CAT 5e
c) CAT 7
d) CAT 8

Correct Answer: b) CAT 5e

Explanation: CAT 5e is a cost-effective alternative to CAT 6 for most network installations, providing support for gigabit speeds over shorter distances.

Question 27

What is a generic network term that can either refer to a software switch or any device that connects dissimilar network segments?

a) Switch
b) Router
c) Bridge
d) Gateway

Correct Answer: c) Bridge

Explanation: A bridge is a network device used to connect different network segments, either in hardware or software.

Question 28

RADIUS, TACACS, and TACACS+ are all examples of what type of security system?

a) Intrusion detection
b) Authorization
c) Authentication
d) Accounting

Correct Answer: c) Authentication

Explanation: RADIUS, TACACS, and TACACS+ are used for centralized authentication services in networks.

Question 29

What is the name for the thin layer that sits between the hardware and operating system and controls the virtual environment?

a) Hypervisor
b) Container
c) Kernel
d) Emulator

Correct Answer: a) Hypervisor

Explanation: A hypervisor is software that allows multiple virtual machines to run on a single physical host by abstracting the underlying hardware.

Question 30

How many B and D channels does Primary Rate Interface (PRI) ISDN have?

a) 23 B, 1 D
b) 30 B, 1 D
c) 10 B, 2 D
d) 16 B, 1 D

Correct Answer: a) 23 B, 1 D

Explanation: PRI ISDN provides 23 B channels for data and 1 D channel for signaling, commonly used in T1 lines.

Question 31

What type of demarc allows a telco to conduct remote diagnostics on your phone line?

a) Smart jack
b) Punch-down block
c) Patch panel
d) Cross-connect

Correct Answer: a) Smart jack

Explanation: A smart jack is a type of demarcation point that allows remote diagnostics and troubleshooting by the service provider.

Question 32

What type of diagram shows the placement of devices in an equipment rack?

a) Topology diagram
b) Floor plan diagram
c) Rack diagram
d) Network diagram

Correct Answer: c) Rack diagram

Explanation: A rack diagram illustrates the arrangement and placement of devices in a network equipment rack.

Question 33

What term refers to the expected time for a device or system to be back in service after a failure?

a) Mean Time to Repair (MTTR)
b) Mean Time Between Failures (MTBF)
c) Recovery Point Objective (RPO)
d) Service Level Agreement (SLA)

Correct Answer: a) Mean Time to Repair (MTTR)

Explanation: MTTR refers to the average time it takes to repair a device or system after it fails.

Question 34

What type of security system examines the logs of many network devices, looking for event correlation and trends?

a) Intrusion Detection System (IDS)
b) Security Information and Event Management (SIEM)
c) Network Access Control (NAC)
d) Data Loss Prevention (DLP)

Correct Answer: b) Security Information and Event Management (SIEM)

Explanation: SIEM systems aggregate and analyze logs from various network devices to identify potential security threats.

Question 35

A site-to-site VPN between two routers typically uses which VPN protocol?

a) L2TP
b) IPSEC
c) SSL
d) PPTP

Correct Answer: b) IPSEC

Explanation: IPSEC is the most commonly used protocol for establishing secure site-to-site VPNs between routers.

Question 36

Uncontrolled use of proprietary software can lead to what type of violations?

a) Bandwidth violations
b) Service Level violations
c) Licensing restrictions
d) Firewall violations

Correct Answer: c) Licensing restrictions

Explanation: Uncontrolled use of proprietary software can violate licensing agreements, leading to legal and financial penalties.

Question 37

Traditional biometrics (something you are) have been extending to include what authentication factor?

a) Something you know
b) Something you do
c) Something you have
d) Something you read

Correct Answer: b) Something you do

Explanation: Biometric authentication has evolved to include "something you do," such as behavioral biometrics like typing patterns or gait.

Question 38

What two encryption protocols are used in WPA2?

a) TKIP and WEP
b) AES and CCMP
c) DES and RC4
d) RSA and SHA

Correct Answer: b) AES and CCMP

Explanation: WPA2 uses AES (Advanced Encryption Standard) for encryption and CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) for message integrity.

Question 39

What key management protocol was introduced in WPA?

a) AES
b) TKIP
c) CCMP
d) IPSec

Correct Answer: b) TKIP

Explanation: TKIP (Temporal Key Integrity Protocol) was introduced in WPA to improve encryption key management and address weaknesses in WEP.

Question 40

What type of attack replaces good ARP cache entries with malicious ones?

a) DNS spoofing
b) ARP poisoning/spoofing
c) Man-in-the-middle attack
d) Buffer overflow

Correct Answer: b) ARP poisoning/spoofing

Explanation: ARP poisoning/spoofing involves sending false ARP messages to a network, causing incorrect IP-to-MAC address mappings in the ARP cache.

Complete the Captcha to view next question set.

Prev Post
WGU D412 Practice Exam Questions – Set 1 – Part 1
Next Post
WGU D412 Practice Exam Questions – Set 1 – Part 3