OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • November 18, 2024

Question 21

What type of attack involves copying and retransmitting network data to capture sensitive information?

a) Man-in-the-middle attack
b) Replay attack
c) DDoS attack
d) Phishing attack

Correct Answer: b) Replay attack

Explanation: A replay attack involves capturing network transmissions and retransmitting them to deceive the system, often to gain unauthorized access.

Question 22

What is the primary purpose of RAID (Redundant Array of Independent Disks)?

a) To increase disk read/write speed
b) To provide redundancy and fault tolerance
c) To assign IP addresses to devices
d) To store encrypted data

Correct Answer: b) To provide redundancy and fault tolerance

Explanation: RAID is a system of disk drives arranged to provide data redundancy and fault tolerance, ensuring data remains available even if a disk fails.

Question 23

What is a honeypot used for in network security?

a) To monitor legitimate traffic
b) To act as a decoy system to attract and analyze attacks
c) To filter out malicious traffic
d) To encrypt sensitive data

Correct Answer: b) To act as a decoy system to attract and analyze attacks

Explanation: A honeypot is a deliberately vulnerable system set up to lure attackers, allowing network administrators to analyze attack methods without compromising actual systems.

Question 24

What does an Access Control List (ACL) do in networking?

a) It assigns dynamic IP addresses
b) It filters network traffic based on security rules
c) It creates VLANs on a network
d) It logs user activities on the network

Correct Answer: b) It filters network traffic based on security rules

Explanation: ACLs control access to network resources by filtering traffic according to predefined rules, enhancing network security.

Question 25

What happens during the power-on self-test (POST) process?

a) The operating system is loaded into memory
b) A quick check of hardware components is performed at startup
c) The system connects to the internet
d) The CPU is overclocked for faster performance

Correct Answer: b) A quick check of hardware components is performed at startup

Explanation: POST is a diagnostic testing process that checks hardware components like the CPU, memory, and storage devices before the operating system loads.

Question 26

What is a rogue access point?

a) A wireless access point with advanced encryption
b) A wireless access point installed without authorization
c) A wired device that monitors network traffic
d) A firewall used to block unwanted traffic

Correct Answer: b) A wireless access point installed without authorization

Explanation: A rogue access point is an unauthorized device on a network, potentially compromising network security by creating vulnerabilities.

Question 27

What does attenuation refer to in networking?

a) Signal interference from other devices
b) Loss of signal strength over distance
c) Amplification of weak signals
d) Data encryption for secure transmission

Correct Answer: b) Loss of signal strength over distance

Explanation: Attenuation is the gradual weakening of a signal as it travels over a medium, reducing the quality or speed of data transmission.

Question 28

What is the primary purpose of DHCP (Dynamic Host Configuration Protocol)?

a) To encrypt network traffic
b) To assign IP addresses automatically
c) To resolve domain names to IP addresses
d) To provide remote access to a network

Correct Answer: b) To assign IP addresses automatically

Explanation: DHCP automates the process of assigning IP addresses to devices on a network, ensuring efficient address management.

Question 29

Which protocol is used to securely transfer files between systems over the internet?

a) FTP
b) SFTP
c) SMTP
d) POP

Correct Answer: b) SFTP

Explanation: Secure File Transfer Protocol (SFTP) provides a secure method for transferring files between systems, unlike FTP, which does not encrypt data.

Question 30

What is a key feature of the RADIUS protocol in network security?

a) It assigns dynamic IP addresses
b) It authenticates users connecting to a network remotely
c) It resolves MAC addresses to IP addresses
d) It provides encrypted communication between servers

Correct Answer: b) It authenticates users connecting to a network remotely

Explanation: RADIUS (Remote Authentication Dial-In User Service) is used to authenticate and authorize remote users connecting to a network.

Question 31

Which IPv6 address type is used to send data to the nearest router?

a) Unicast
b) Multicast
c) Broadcast
d) Anycast

Correct Answer: d) Anycast

Explanation: Anycast addresses in IPv6 are designed to route data to the nearest interface in terms of routing distance, commonly used for routers.

Question 32

What is a “collision domain” in networking?

a) A network segment where data collisions occur
b) A wireless network with low signal strength
c) A VLAN segment that restricts communication
d) A section of a network with encrypted traffic

Correct Answer: a) A network segment where data collisions occur

Explanation: A collision domain is a network segment where data collisions can occur if two devices attempt to send data simultaneously.

Question 33

What is the role of Active Directory in a Windows Server environment?

a) It provides firewall protection
b) It manages user accounts, permissions, and network resources
c) It assigns IP addresses automatically
d) It filters network traffic based on predefined rules

Correct Answer: b) It manages user accounts, permissions, and network resources

Explanation: Active Directory is a directory service in Windows Server environments used to manage user accounts, access permissions, and resources across the network.

Question 34

What type of backup method involves copying all data that has changed since the last full backup?

a) Incremental backup
b) Differential backup
c) Full backup
d) Mirror backup

Correct Answer: b) Differential backup

Explanation: A differential backup saves all data that has changed since the last full backup, unlike incremental backups, which only save data changed since the last backup (full or incremental).

Question 35

Which topology uses a central hub to connect all devices in a network?

a) Ring topology
b) Star topology
c) Mesh topology
d) Bus topology

Correct Answer: b) Star topology

Explanation: In a star topology, all devices connect to a central hub or switch, which manages the flow of data between devices on the network.

Question 36

What is a MAC address used for in networking?

a) It assigns IP addresses to network devices
b) It encrypts data being transmitted
c) It provides a unique identifier for a network device
d) It filters unwanted traffic from the network

Correct Answer: c) It provides a unique identifier for a network device

Explanation: A MAC (Media Access Control) address is a unique physical identifier assigned to network interfaces, ensuring devices can be properly identified within a network.

Question 37

What is the main purpose of a packet sniffer in network management?

a) To encrypt data packets for secure transmission
b) To capture and analyze network traffic
c) To block malicious packets from entering the network
d) To assign IP addresses to network devices

Correct Answer: b) To capture and analyze network traffic

Explanation: A packet sniffer is a network monitoring tool that captures data packets as they travel across a network, allowing administrators to analyze traffic for troubleshooting or security purposes.

Question 38

What is the purpose of NAT (Network Address Translation)?

a) To resolve domain names to IP addresses
b) To allow private IP addresses to communicate with public networks
c) To assign IP addresses to devices on a network
d) To provide encrypted communication between devices

Correct Answer: b) To allow private IP addresses to communicate with public networks

Explanation: NAT enables devices with private IP addresses to access external networks (like the internet) by translating private addresses into public ones.

Question 39

What is the maximum transmission rate for a 10BaseT network?

a) 10 Mbps
b) 100 Mbps
c) 1 Gbps
d) 10 Gbps

Correct Answer: a) 10 Mbps

Explanation: 10BaseT networks support a maximum data transmission rate of 10 Mbps over twisted-pair cabling.

Question 40

What does the acronym POST stand for in computer systems?

a) Power-On Self-Test
b) Protocol Over Secure Transport
c) Packet Optimization Service Tunnel
d) Physical Operating System Test

Correct Answer: a) Power-On Self-Test

Explanation: POST refers to the initial diagnostic test that runs when a computer is powered on to check for hardware issues before the operating system loads.

Complete the Captcha to view next question set.

Prev Post
WGU D413 Practice Exam Questions – Set 1 – Part 1
Next Post
WGU D413 Practice Exam Questions – Set 1 – Part 3