OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • November 19, 2024

Question 41

What can you use to periodically verify that a file has maintained its integrity?

a) Encryption
b) File hashing
c) Data compression
d) RAID

Correct Answer: b) File hashing

Explanation: File hashing creates a unique hash value for a file that can be used to verify its integrity over time, ensuring it hasn't been tampered with or corrupted.

Question 42

What type of feature works with spanning tree to mitigate the risk of introducing rogue root switches?

a) Loop guard
b) Root guard
c) BPDU filter
d) Storm control

Correct Answer: b) Root guard

Explanation: Root guard is a feature used in spanning tree protocols to prevent unauthorized switches from becoming the root switch.

Question 43

What type of punch-down block is typically found on the back of a patch panel?

a) 66 block
b) 110 block
c) Cross-connect block
d) Smart jack

Correct Answer: b) 110 block

Explanation: 110 punch-down blocks are commonly used on the back of patch panels to terminate and organize network cables.

Question 44

What hardware tool can identify breaks and insertion loss in a fiber optic cable?

a) Tone generator
b) Multimeter
c) OTDR
d) Cable tester

Correct Answer: c) OTDR

Explanation: An Optical Time-Domain Reflectometer (OTDR) is used to detect faults, breaks, and loss of signal in fiber optic cables.

Question 45

What command identifies a network path as well as reports on packet loss?

a) ipconfig
b) traceroute
c) pathping
d) ping

Correct Answer: c) pathping

Explanation: The pathping command is a combination of ping and traceroute, providing both route information and packet loss statistics.

Question 46

What command is the Linux equivalent of ipconfig?

a) netstat
b) ifconfig
c) traceroute
d) ping

Correct Answer: b) ifconfig

Explanation: In Linux systems, the ifconfig command is used to configure and display network interface settings, similar to ipconfig in Windows.

Question 47

What common command line tool can be used to port scan a network?

a) Wireshark
b) ipconfig
c) nmap
d) ping

Correct Answer: c) nmap

Explanation: Nmap is a widely used tool for network discovery and security auditing, often employed to scan open ports on a network.

Question 48

What type of cable flips the transmit and receive pairs?

a) Straight-through cable
b) Crossover cable
c) Fiber optic cable
d) Shielded cable

Correct Answer: b) Crossover cable

Explanation: Crossover cables are used to connect two similar devices directly, such as two computers or two switches, by flipping the transmit and receive pairs.

Question 49

What is the word for variable latency?

a) Jitter
b) Lag
c) Echo
d) Drop

Correct Answer: a) Jitter

Explanation: Jitter refers to the variation in packet delay, which can cause issues in real-time applications like VoIP.

Question 50

What is typically responsible for handing out unauthorized IP addresses to clients?

a) Rogue DNS server
b) Rogue DHCP server
c) Man-in-the-middle attack
d) ARP poisoning

Correct Answer: b) Rogue DHCP server

Explanation: A rogue DHCP server is an unauthorized server that hands out incorrect IP addresses to clients, potentially disrupting network communication.

Complete the Captcha to view next question set.

Prev Post
WGU D412 Practice Exam Questions – Set 3 – Part 2
Next Post
WGU D412 Practice Exam Questions – Set 4 – Part 1