OA Exams

  • web.groovymark@gmail.com
  • November 18, 2024

Question 41

Which protocol is used to stream real-time voice and video over IP networks?

a) RTP
b) FTP
c) SMTP
d) POP

Correct Answer: a) RTP

Explanation: Real-Time Transport Protocol (RTP) is designed to transmit real-time voice, video, and multimedia data over IP networks.

Question 42

What type of attack involves the use of IP spoofing to flood a network with traffic?

a) Man-in-the-middle attack
b) Phishing attack
c) Smurf attack
d) Replay attack

Correct Answer: c) Smurf attack

Explanation: A Smurf attack uses IP spoofing to send ICMP packets to a broadcast address, overwhelming the network with traffic.

Question 43

What is a typical use of the DMZ (demilitarized zone) in network security?

a) To connect multiple VLANs
b) To isolate publicly accessible servers from the internal network
c) To provide dynamic IP addressing
d) To assign user permissions in Active Directory

Correct Answer: b) To isolate publicly accessible servers from the internal network

Explanation: A DMZ is a network segment that contains systems accessible from the internet, separating them from the internal, private network for security purposes.

Question 44

What is the role of WINS (Windows Internet Naming Service)?

a) It assigns IP addresses automatically
b) It maps NetBIOS names to IP addresses
c) It encrypts network traffic for secure communication
d) It provides VLAN tagging on a network

Correct Answer: b) It maps NetBIOS names to IP addresses

Explanation: WINS resolves NetBIOS names to IP addresses, enabling older systems that use NetBIOS to communicate on modern IP-based networks.

Question 45

What type of signal does fiber-optic cabling transmit?

a) Analog signals
b) Radio waves
c) Electromagnetic waves
d) Light signals

Correct Answer: d) Light signals

Explanation: Fiber-optic cables use light signals to transmit data over long distances at high speeds, making them less prone to interference than copper-based cables.

Question 46

Which wireless security protocol is considered the most secure?

a) WEP
b) WPA
c) WPA2
d) SSID

Correct Answer: c) WPA2

Explanation: WPA2 is the most secure of the common wireless security protocols, using stronger encryption methods than WEP and WPA.

Question 47

What is the purpose of a VLAN trunk?

a) To connect multiple VLANs together
b) To connect wireless devices to the network
c) To amplify weak signals
d) To encrypt network traffic between VLANs

Correct Answer: a) To connect multiple VLANs together

Explanation: A VLAN trunk connects multiple VLANs over a single physical link, allowing VLAN traffic to pass between network devices.

Question 48

Which tool is used to terminate twisted-pair cabling in a network?

a) Crimping tool
b) Punch down tool
c) Wire stripper
d) Multimeter

Correct Answer: b) Punch down tool

Explanation: A punch down tool is used to insert and secure twisted-pair wires into network terminations, such as patch panels and keystone jacks.

Question 49

What does the term “biometrics” refer to in network security?

a) The use of physical characteristics for authentication
b) The use of encryption to secure data
c) The use of passwords and PINs for authentication
d) The monitoring of network traffic for security purposes

Correct Answer: a) The use of physical characteristics for authentication

Explanation: Biometrics refers to using unique physical traits, such as fingerprints or facial recognition, to verify identity in security systems.

Question 50

What type of network is usually confined to a single building and managed by a single entity?

a) WAN
b) MAN
c) LAN
d) PAN

Correct Answer: c) LAN

Explanation: A local area network (LAN) is typically confined to a single building or location and is managed by a single organization, connecting computers and devices within that space.

Complete the Captcha to view next question set.

Prev Post
WGU D413 Practice Exam Questions – Set 1 – Part 2
Next Post
WGU D413 Practice Exam Questions – Set 2 – Part 1