OA Exams

  • web.groovymark@gmail.com
  • November 19, 2024

Question 21

What is the function of NAT in a network?

a) Assign IP addresses to devices
b) Translate private IP addresses to public IP addresses
c) Route traffic between networks
d) Encrypt network traffic

Correct Answer: b) Translate private IP addresses to public IP addresses

Explanation: NAT (Network Address Translation) translates private IP addresses to public IP addresses, allowing devices on a private network to communicate with the internet.

Question 22

Which protocol uses port 53 to provide name resolution services?

a) HTTP
b) FTP
c) DNS
d) Telnet

Correct Answer: c) DNS

Explanation: DNS (Domain Name System) uses port 53 to provide name resolution services, translating domain names into IP addresses.

Question 23

What type of attack occurs when an attacker sends falsified ARP messages to the network, causing traffic to be misdirected?

a) DNS poisoning
b) ARP poisoning
c) Man-in-the-middle
d) Phishing

Correct Answer: b) ARP poisoning

Explanation: ARP poisoning occurs when an attacker sends falsified ARP messages to the network, causing traffic to be misdirected to the attacker’s machine.

Question 24

Which OSI layer is responsible for controlling how data is transmitted over the physical medium, including framing and error detection?

a) Data Link layer
b) Network layer
c) Transport layer
d) Physical layer

Correct Answer: a) Data Link layer

Explanation: The Data Link layer (Layer 2) is responsible for controlling how data is transmitted over the physical medium, including framing and error detection.

Question 25

Which wireless security protocol is considered the most secure for protecting Wi-Fi networks?

a) WEP
b) WPA
c) WPA2
d) TKIP

Correct Answer: c) WPA2

Explanation: WPA2 (Wi-Fi Protected Access 2) is considered the most secure wireless security protocol and is recommended for protecting Wi-Fi networks.

Question 26

What command is used to display all active network connections and listening ports on a Linux machine?

a) ifconfig
b) traceroute
c) netstat
d) ping

Correct Answer: c) netstat

Explanation: The netstat command displays all active network connections and listening ports on a Linux machine, providing information about network activity.

Question 27

Which protocol is used by the ping command to test network connectivity between devices?

a) ICMP
b) TCP
c) UDP
d) DNS

Correct Answer: a) ICMP

Explanation: The ping command uses ICMP (Internet Control Message Protocol) to send echo requests and receive echo replies to test network connectivity between devices.

Question 28

What is the main purpose of a load balancer in a network?

a) To provide firewall protection
b) To assign IP addresses to devices
c) To distribute network traffic across multiple servers
d) To encrypt network communications

Correct Answer: c) To distribute network traffic across multiple servers

Explanation: A load balancer distributes network traffic across multiple servers to improve performance and prevent any single server from being overwhelmed.

Question 29

Which type of DNS query is typically sent by a DNS resolver to request the best possible answer without expecting further queries?

a) Recursive query
b) Iterative query
c) Reverse query
d) Dynamic query

Correct Answer: b) Iterative query

Explanation: In an iterative query, the DNS resolver asks the server to return the best possible answer, which may include referrals to other DNS servers if needed.

Question 30

Which routing protocol uses the concept of areas to optimize routing efficiency and reduce overhead in large networks?

a) OSPF
b) RIP
c) EIGRP
d) BGP

Correct Answer: a) OSPF

Explanation: OSPF (Open Shortest Path First) uses the concept of areas to optimize routing efficiency and reduce overhead in large networks.

Question 31

Which device is used to connect multiple network segments, manage traffic, and reduce collisions in a network?

a) Hub
b) Repeater
c) Switch
d) Router

Correct Answer: c) Switch

Explanation: A switch connects multiple network segments, manages traffic, and reduces collisions by forwarding frames only to the intended recipient based on MAC addresses.

Question 32

What is the maximum number of hops allowed in the RIP protocol to prevent routing loops?

a) 10
b) 15
c) 20
d) 25

Correct Answer: b) 15

Explanation: The maximum number of hops allowed in the RIP (Routing Information Protocol) is 15 to prevent routing loops and keep networks efficient.

Question 33

What type of device acts as an intermediary between a client and a server, handling requests on behalf of the client?

a) Router
b) Firewall
c) Proxy server
d) Switch

Correct Answer: c) Proxy server

Explanation: A proxy server acts as an intermediary between a client and a server, forwarding client requests to the server and returning responses to the client.

Question 34

Which wireless transmission type does NOT require a clear line of sight (LOS) to function?

a) Wi-Fi
b) Infrared
c) Microwave
d) Satellite

Correct Answer: a) Wi-Fi

Explanation: Wi-Fi does not require a clear line of sight (LOS) to function and can transmit data through walls and other obstacles.

Question 35

What does the acronym DHCP stand for, and what is its primary function?

a) Domain Host Configuration Protocol, used for resolving domain names
b) Dynamic Host Configuration Protocol, used for assigning IP addresses
c) Data Host Control Protocol, used for managing data traffic
d) Domain Handler Communication Protocol, used for email transmission

Correct Answer: b) Dynamic Host Configuration Protocol, used for assigning IP addresses

Explanation: DHCP (Dynamic Host Configuration Protocol) is used for dynamically assigning IP addresses and other network configuration settings to devices.

Question 36

Which network protocol is used to secure web communications by encrypting traffic between a web server and a browser?

a) HTTP
b) FTP
c) HTTPS
d) Telnet

Correct Answer: c) HTTPS

Explanation: HTTPS (Hypertext Transfer Protocol Secure) encrypts web traffic between a web server and a browser, ensuring secure communication.

Question 37

Which command on a Cisco router is used to save the current running configuration to NVRAM?

a) copy running-config startup-config
b) copy running-config flash
c) save config tftp
d) write memory

Correct Answer: a) copy running-config startup-config

Explanation: The copy running-config startup-config command saves the current running configuration to NVRAM on a Cisco router, ensuring it persists after a reboot.

Question 38

What is the primary purpose of using load balancing in a network environment?

a) To encrypt data between servers
b) To distribute traffic across multiple servers
c) To provide IP address resolution
d) To manage VLAN configurations

Correct Answer: b) To distribute traffic across multiple servers

Explanation: Load balancing distributes network traffic across multiple servers to ensure that no single server is overwhelmed and to improve overall network performance.

Question 39

Which protocol allows multiple hosts on a local network to communicate over a single public IP address?

a) DNS
b) NAT
c) DHCP
d) ICMP

Correct Answer: b) NAT

Explanation: NAT (Network Address Translation) allows multiple hosts on a private network to share a single public IP address when communicating with external networks

Question 40

Which network security protocol provides encrypted communication over a network and is commonly used for secure remote logins?

a) Telnet
b) FTP
c) SSH
d) SMTP

Correct Answer: c) SSH

Explanation: SSH (Secure Shell) provides encrypted communication over a network and is commonly used for secure remote logins to devices.

Complete the Captcha to view next question set.

Prev Post
WGU D412 Practice Exam Questions – Set 4 – Part 1
Next Post
WGU D412 Practice Exam Questions – Set 4 – Part 3