OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • November 18, 2024

Question 01

What does a switch primarily do in a network?

a) Amplifies network signals
b) Filters and forwards data packets based on MAC addresses
c) Assigns IP addresses to devices
d) Encrypts data traffic for secure transmission

Correct Answer: b) Filters and forwards data packets based on MAC addresses

Explanation: A switch operates at Layer 2 of the OSI model and uses MAC addresses to filter and forward data to the appropriate device within a network.

Question 02

Which type of topology connects each network device to every other network device?

a) Star topology
b) Mesh topology
c) Bus topology
d) Ring topology

Correct Answer: b) Mesh topology

Explanation: In a mesh topology, each device is connected to every other device in the network, providing high redundancy and fault tolerance.

Question 03

What is the function of a UPS (Uninterruptible Power Supply)?

a) To regulate network traffic
b) To supply electrical power to a network during a power outage
c) To assign IP addresses to devices on a network
d) To amplify weak signals in a network

Correct Answer: b) To supply electrical power to a network during a power outage

Explanation: A UPS provides backup power in the event of a power failure, ensuring critical systems remain operational during short outages.

Question 04

Which protocol provides a secure method of accessing a remote computer over a network?

a) Telnet
b) SSH
c) HTTP
d) FTP

Correct Answer: b) SSH

Explanation: Secure Shell (SSH) provides a secure method for accessing remote systems over a network by encrypting communication, unlike Telnet, which is not secure.

Question 05

What is the primary use of a “punch down tool”?

a) To crimp RJ-45 connectors
b) To insert twisted-pair cables into network terminations
c) To test network cable continuity
d) To strip the insulation from network cables

Correct Answer: b) To insert twisted-pair cables into network terminations

Explanation: A punch down tool is used to securely connect twisted-pair wires into patch panels and keystone jacks, ensuring a proper connection.

Question 06

What does MAC address filtering do in network security?

a) It filters data packets based on IP addresses
b) It restricts network access based on the MAC address of a device
c) It encrypts data transmissions to prevent unauthorized access
d) It assigns IP addresses dynamically

Correct Answer: b) It restricts network access based on the MAC address of a device

Explanation: MAC address filtering is a security feature that allows or blocks devices from accessing the network based on their unique physical MAC address.

Question 07

What is the primary benefit of using VLANs (Virtual Local Area Networks)?

a) They increase the range of wireless signals
b) They allow logical segmentation of a network, improving security and management
c) They encrypt data to prevent unauthorized access
d) They automatically assign IP addresses to devices

Correct Answer: b) They allow logical segmentation of a network, improving security and management

Explanation: VLANs allow administrators to segment a physical network into multiple logical networks, enhancing security and simplifying network management.

Question 08

What does the acronym FTP stand for?

a) File Transport Protocol
b) File Transfer Protocol
c) Fast Transmission Protocol
d) File Transmission Path

Correct Answer: b) File Transfer Protocol

Explanation: FTP stands for File Transfer Protocol, a standard network protocol used to transfer files between a client and a server over a network.

Question 09

What is the primary function of a repeater in a network?

a) To route data between networks
b) To extend the range of a network by amplifying signals
c) To filter traffic based on IP addresses
d) To assign dynamic IP addresses

Correct Answer: b) To extend the range of a network by amplifying signals

Explanation: A repeater regenerates and amplifies signals to extend the distance data can travel over a network without signal degradation.

Question 10

Which OSI model layer is responsible for addressing and routing data between networks?

a) Data link layer
b) Transport layer
c) Network layer
d) Physical layer

Correct Answer: c) Network layer

Explanation: The network layer (Layer 3) is responsible for addressing and routing data packets between different networks using IP addresses.

Question 11

Which wireless security protocol is considered outdated and vulnerable to attacks?

a) WPA2
b) WPA
c) WEP
d) AES

Correct Answer: c) WEP

Explanation: WEP (Wired Equivalent Privacy) is an older wireless security protocol that has known vulnerabilities and is no longer considered secure.

Question 12

What does attenuation cause in a network cable?

a) Increased signal strength
b) Loss of signal strength over distance
c) Signal encryption for security
d) Improved network speed

Correct Answer: b) Loss of signal strength over distance

Explanation: Attenuation refers to the weakening of a signal as it travels over a long distance, reducing the effectiveness of data transmission.

Question 13

What is a man-in-the-middle attack?

a) An attack where data is intercepted and altered before reaching its destination
b) An attack that floods a network with excessive traffic
c) An attack where malware is installed on a computer
d) An attack that involves sending phishing emails

Correct Answer: a) An attack where data is intercepted and altered before reaching its destination

Explanation: A man-in-the-middle attack involves intercepting and potentially altering communications between two parties without their knowledge.

Question 14

What is the role of a Domain Name System (DNS)?

a) To assign IP addresses automatically
b) To resolve domain names to IP addresses
c) To filter network traffic based on security rules
d) To encrypt data transmissions

Correct Answer: b) To resolve domain names to IP addresses

Explanation: DNS translates human-readable domain names (e.g., www.example.com) into numerical IP addresses used for communication on the internet.

Question 15

What type of network uses radio waves to transmit data over short distances?

a) Local Area Network (LAN)
b) Wide Area Network (WAN)
c) Personal Area Network (PAN)
d) Virtual Private Network (VPN)

Correct Answer: c) Personal Area Network (PAN)

Explanation: A PAN typically uses technologies like Bluetooth to transmit data over short distances between personal devices such as smartphones, tablets, and laptops.

Question 16

Which type of firewall inspects the state of packets over a connection?

a) Stateless packet inspection firewall
b) Stateful packet inspection firewall
c) Proxy firewall
d) Application-layer firewall

Correct Answer: b) Stateful packet inspection firewall

Explanation: A stateful packet inspection firewall examines the state of each packet in the context of the ongoing connection, allowing it to filter traffic based on connection state and security rules.

Question 17

What does PoE (Power over Ethernet) allow network cables to do?

a) Transfer data faster over a wired connection
b) Provide power to devices like IP cameras or access points
c) Assign IP addresses dynamically
d) Increase the range of wireless signals

Correct Answer: b) Provide power to devices like IP cameras or access points

Explanation: PoE enables Ethernet cables to supply electrical power to devices such as IP cameras, wireless access points, and VoIP phones, eliminating the need for separate power cables.

Question 18

What is the purpose of a VLAN trunk?

a) To connect multiple VLANs using a single network link
b) To assign dynamic IP addresses to devices
c) To filter traffic based on MAC addresses
d) To encrypt wireless network signals

Correct Answer: a) To connect multiple VLANs using a single network link

Explanation: A VLAN trunk allows data from multiple VLANs to travel over a single network link between network devices like switches.

Question 19

Which device is typically used to amplify a weak signal in a fiber-optic network?

a) Switch
b) Repeater
c) Router
d) Bridge

Correct Answer: b) Repeater

Explanation: In fiber-optic networks, a repeater is used to amplify or regenerate weak signals, allowing data to travel longer distances without signal degradation.

Question 20

Which type of network topology uses a single cable to connect all devices?

a) Star topology
b) Ring topology
c) Mesh topology
d) Bus topology

Correct Answer: d) Bus topology

Explanation: A bus topology consists of a single central cable (the bus) to which all devices are connected, allowing data to travel along the cable to all devices.

Complete the Captcha to view next question set.

Prev Post
WGU D413 Practice Exam Questions – Set 1 – Part 3
Next Post
WGU D413 Practice Exam Questions – Set 2 – Part 2