OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • November 19, 2024

Question 01

What protocol provides secure, encrypted communication over an insecure network, often used for remote management of devices?

a) FTP
b) SSH
c) Telnet
d) SNMP

Correct Answer: b) SSH

Explanation: SSH (Secure Shell) is a protocol that provides secure, encrypted communication over an insecure network and is often used for remote management of devices.

Question 02

Which command on a Cisco router is used to display the current IP routing table?

a) show ip route
b) show running-config
c) show interfaces
d) show protocol

Correct Answer: a) show ip route

Explanation: The show ip route command displays the current IP routing table on a Cisco router, showing the routes configured and available.

Question 03

What does the acronym MTTR stand for in network management?

a) Mean Time to Repair
b) Maximum Transmission Time Response
c) Mean Total Traffic Routing
d) Managed Transmission Throughput Rate

Correct Answer: a) Mean Time to Repair

Explanation: MTTR (Mean Time to Repair) refers to the average time required to repair a failed component or device in a network or system.

Question 04

Which routing protocol uses a hop count as its metric and is limited to 15 hops?

a) OSPF
b) EIGRP
c) RIP
d) BGP

Correct Answer: c) RIP

Explanation: RIP (Routing Information Protocol) uses hop count as its metric and is limited to a maximum of 15 hops to prevent routing loops.

Question 05

What is the primary function of a proxy server in a network?

a) Route data between subnets
b) Provide a direct connection to the internet
c) Act on behalf of a client to request services from another server
d) Manage network security policies

Correct Answer: c) Act on behalf of a client to request services from another server

Explanation: A proxy server acts as an intermediary between a client and a server, forwarding client requests to other servers.

Question 06

Which OSI layer is responsible for establishing, managing, and terminating sessions between devices?

a) Application layer
b) Presentation layer
c) Session layer
d) Transport layer

Correct Answer: c) Session layer

Explanation: The Session layer (Layer 5) is responsible for establishing, managing, and terminating sessions between devices.

Question 07

What type of wireless attack involves setting up a rogue access point that appears legitimate to users?

a) Evil twin
b) Man-in-the-middle
c) Wardriving
d) Packet sniffing

Correct Answer: a) Evil twin

Explanation: An evil twin attack involves setting up a rogue access point that mimics a legitimate one, tricking users into connecting to it.

Question 08

Which type of network topology provides redundancy by connecting each node to every other node in the network?

a) Star
b) Mesh
c) Bus
d) Ring

Correct Answer: b) Mesh

Explanation: A mesh topology provides redundancy by connecting each node to every other node in the network, ensuring multiple paths for data transmission.

Question 09

Which network device operates at the OSI Network layer and is responsible for routing traffic between different networks?

a) Hub
b) Switch
c) Router
d) Bridge

Correct Answer: c) Router

Explanation: A router operates at the OSI Network layer (Layer 3) and is responsible for routing traffic between different networks based on IP addresses.

Question 10

What command is used on a Windows machine to display the current IP address configuration, including the default gateway?

a) traceroute
b) netstat
c) ipconfig
d) ifconfig

Correct Answer: c) ipconfig

Explanation: The ipconfig command on a Windows machine displays the current IP address configuration, including the default gateway.

Question 11

What type of wireless security protocol is considered outdated due to vulnerabilities and has been replaced by WPA and WPA2?

a) WEP
b) WPA
c) WPA2
d) TKIP

Correct Answer: a) WEP

Explanation: WEP (Wired Equivalent Privacy) is considered outdated due to significant vulnerabilities and has been replaced by more secure protocols like WPA and WPA2.

Question 12

Which protocol is responsible for managing network devices and gathering statistics about network performance?

a) SNMP
b) ICMP
c) FTP
d) DHCP

Correct Answer: a) SNMP

Explanation: SNMP (Simple Network Management Protocol) is used to manage network devices and gather performance statistics such as bandwidth usage and error rates.

Question 13

What is the purpose of a VLAN on a network switch?

a) To increase bandwidth
b) To separate logical network segments on the same physical network
c) To provide network redundancy
d) To manage IP address assignments

Correct Answer: b) To separate logical network segments on the same physical network

Explanation: A VLAN (Virtual Local Area Network) separates logical network segments on the same physical network, improving security and traffic management.

Question 14

Which DNS record type is used to reverse-map an IP address to a domain name?

a) A record
b) PTR record
c) CNAME record
d) MX record

Correct Answer: b) PTR record

Explanation: A PTR (Pointer) record is used in DNS to reverse-map an IP address to its corresponding domain name.

Question 15

What is the primary purpose of a firewall in a network?

a) To route traffic between networks
b) To provide encryption for network communications
c) To filter incoming and outgoing traffic based on security rules
d) To manage IP address assignments

Correct Answer: c) To filter incoming and outgoing traffic based on security rules

Explanation: A firewall filters incoming and outgoing traffic based on security rules, protecting the network from unauthorized access and attacks.

Question 16

Which command displays the routing table on a Linux system?

a) traceroute
b) route
c) netstat
d) ifconfig

Correct Answer: b) route

Explanation: The route command displays the routing table on a Linux system, showing the routes that the system uses to forward network traffic.

Question 17

What is the name of the protocol that maps an IP address to a MAC address on a local network?

a) ARP
b) DHCP
c) DNS
d) ICMP

Correct Answer: a) ARP

Explanation: ARP (Address Resolution Protocol) is used to map an IP address to a MAC address on a local network.

Question 18

Which OSI layer is responsible for data encryption and decryption, ensuring secure transmission of data between applications?

a) Network layer
b) Data Link layer
c) Presentation layer
d) Session layer

Correct Answer: c) Presentation layer

Explanation: The Presentation layer (Layer 6) is responsible for data encryption and decryption, ensuring secure transmission of data between applications.

Question 19

What command is used on a Linux system to display the current IP address configuration?

a) ifconfig
b) ipconfig
c) traceroute
d) netstat

Correct Answer: a) ifconfig

Explanation: The ifconfig command is used on Linux systems to display the current IP address configuration for network interfaces.

Question 20

Which of the following is an example of a tunneling protocol used to create secure connections over a public network?

a) HTTP
b) SSL
c) VPN
d) DNS

Correct Answer: c) VPN

Explanation: VPN (Virtual Private Network) uses tunneling protocols like PPTP, L2TP, or IPsec to create secure connections over a public network like the internet.

Complete the Captcha to view next question set.

Prev Post
WGU D412 Practice Exam Questions – Set 3 – Part 3
Next Post
WGU D412 Practice Exam Questions – Set 4 – Part 2