OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • November 18, 2024

Question 01

What is the primary function of a router in a network?

a) To connect computers to a local area network
b) To navigate packets across large networks using the most efficient route
c) To connect peripheral devices to a computer
d) To amplify weak network signals

Correct Answer: b) To navigate packets across large networks using the most efficient route

Explanation: Routers are responsible for directing data packets across different networks by selecting the most efficient route. This is distinct from connecting devices locally, which is a function of hubs or switches.

Question 02

What does “half-duplex” communication refer to?

a) Communication that can occur in both directions simultaneously
b) Communication that only allows one direction at a time
c) Communication that allows multiple devices to communicate simultaneously
d) Communication limited to one device at a time

Correct Answer: b) Communication that only allows one direction at a time

Explanation: Half-duplex communication allows data to flow in both directions, but only one direction at a time, unlike full-duplex, which allows simultaneous communication.

Question 03

Which IEEE standard specifies the supply of small amounts of electrical power to network devices?

a) 802.3af (PoE)
b) 802.11n
c) 802.15
d) 802.16

Correct Answer: a) 802.3af (PoE)

Explanation: Power over Ethernet (PoE) is specified by the IEEE 802.3af standard, which enables electrical power to be delivered over Ethernet cables to network devices like IP cameras or wireless access points.

Question 04

What is the purpose of the Address Resolution Protocol (ARP)?

a) To resolve domain names to IP addresses
b) To resolve IP addresses to MAC addresses
c) To encrypt network traffic
d) To assign dynamic IP addresses

Correct Answer: b) To resolve IP addresses to MAC addresses

Explanation: ARP is used to map an IPv4 address to a device's physical (MAC) address, enabling communication within a network.

Question 05

Which of the following is a feature of 10Base2 networking?

a) It uses UTP cables
b) It uses RG-58 coaxial cable
c) It supports a speed of 100 Mbps
d) It is designed for fiber-optic connections

Correct Answer: b) It uses RG-58 coaxial cable

Explanation: 10Base2 is a network specification that uses RG-58 coaxial cable and supports data rates of 10 Mbps.

Question 06

What is the purpose of a proxy server?

a) To connect wireless devices to a network
b) To act as an intermediary between a client and a server for security purposes
c) To directly encrypt network traffic
d) To provide IP addresses to clients on a network

Correct Answer: b) To act as an intermediary between a client and a server for security purposes

Explanation: A proxy server serves as an intermediary for requests between a client and another server, often to enhance security or manage traffic.

Question 07

Which topology consists of a continuous cable connecting all network nodes in a loop?

a) Star topology
b) Ring topology
c) Mesh topology
d) Bus topology

Correct Answer: b) Ring topology

Explanation: In a ring topology, all network devices are connected in a loop, allowing data to travel around the ring in one or both directions.

Question 08

What function does a firewall typically perform?

a) It connects multiple devices to a network
b) It filters incoming and outgoing traffic based on security rules
c) It assigns IP addresses to devices
d) It acts as an amplifier for weak signals

Correct Answer: b) It filters incoming and outgoing traffic based on security rules

Explanation: Firewalls filter network traffic to prevent unauthorized access and protect a network from external threats.

Question 09

What is an essential characteristic of a “hot-swappable” device?

a) It can be removed and replaced without shutting down the system
b) It requires system shutdown for replacement
c) It only operates in low-power modes
d) It requires manual configuration to replace

Correct Answer: a) It can be removed and replaced without shutting down the system

Explanation: Hot-swappable devices can be added or replaced without interrupting the system’s operation, improving uptime and flexibility.

Question 10

Which layer of the OSI model is responsible for ensuring reliable data transfer?

a) Transport layer
b) Network layer
c) Data link layer
d) Physical layer

Correct Answer: a) Transport layer

Explanation: The transport layer ensures reliable data transmission by managing packet sequencing, error detection, and flow control.

Question 11

What is the main purpose of a VLAN (Virtual Local Area Network)?

a) To provide dynamic IP addresses to devices
b) To segment a network logically without regard to the physical layout
c) To amplify weak signals in a network
d) To connect devices wirelessly within a LAN

Correct Answer: b) To segment a network logically without regard to the physical layout

Explanation: A VLAN allows devices to be grouped logically into networks, improving network organization and security, regardless of physical location.

Question 12

What is the key feature of ad hoc mode in wireless networks?

a) It requires a centralized access point
b) It is a direct peer-to-peer connection without an access point
c) It uses wired network infrastructure
d) It guarantees a higher security level than infrastructure mode

Correct Answer: b) It is a direct peer-to-peer connection without an access point

Explanation: In ad hoc mode, devices communicate directly with each other without a central access point, typically for smaller, temporary networks.

Question 13

What does the acronym APIPA stand for?

a) Automatic Private IP Addressing
b) Advanced Packet IP Allocation
c) Address Protocol Internet Assignment
d) Automatic Public IP Addressing

Correct Answer: a) Automatic Private IP Addressing

Explanation: APIPA automatically assigns an IP address in the absence of a DHCP server, typically used for small, simple network configurations.

Question 14

Which type of backup copies only the data that has changed since the last full or incremental backup?

a) Full backup
b) Differential backup
c) Incremental backup
d) Mirror backup

Correct Answer: c) Incremental backup

Explanation: Incremental backups only save changes made since the last backup, which reduces backup time and storage space compared to full backups.

Question 15

What is the role of a DNS server in a network?

a) To map MAC addresses to IP addresses
b) To resolve domain names to IP addresses
c) To encrypt network data packets
d) To assign dynamic IP addresses

Correct Answer: b) To resolve domain names to IP addresses

Explanation: DNS servers translate human-readable domain names into numerical IP addresses, facilitating easier navigation on the internet.

Question 16

Which protocol is primarily used for transferring files over a network?

a) FTP
b) SMTP
c) IMAP
d) HTTP

Correct Answer: a) FTP

Explanation: File Transfer Protocol (FTP) is designed specifically for transferring files between clients and servers over a network.

Question 17

Which layer of the OSI model is known as the presentation layer?

a) Layer 5
b) Layer 6
c) Layer 4
d) Layer 7

Correct Answer: b) Layer 6

Explanation: The presentation layer (Layer 6) is responsible for translating data formats, ensuring proper character-code recognition, and managing data encryption.

Question 18

What is a common characteristic of a Class A network?

a) It supports up to 254 hosts per network
b) It can support up to 16 million hosts on each network
c) It supports up to 65,000 hosts per network
d) It has a default subnet mask of 255.255.255.0

Correct Answer: b) It can support up to 16 million hosts on each network

Explanation: Class A networks are designed to support large numbers of hosts, with IP address ranges allowing millions of devices to be connected.

Question 19

Which type of encryption uses two keys, one public and one private?

a) Symmetric-key encryption
b) Asymmetric-key encryption
c) WEP encryption
d) WPA encryption

Correct Answer: b) Asymmetric-key encryption

Explanation: Asymmetric encryption, also known as public-key cryptography, uses a pair of keys (public and private) to secure data.

Question 20

What does a VPN (Virtual Private Network) allow users to do?

a) Access a remote server securely over the internet
b) Assign IP addresses automatically
c) Filter packets based on security rules
d) Encrypt all data on a local network

Correct Answer: a) Access a remote server securely over the internet

Explanation: A VPN enables users to establish a secure connection over a public network, typically the internet, to access private resources remotely.

Complete the Captcha to view next question set.

Prev Post
WGU D415 Practice Exam Questions – Set 5 – Part 3
Next Post
WGU D413 Practice Exam Questions – Set 1 – Part 2