OA Exams

  • web.groovymark@gmail.com
  • November 18, 2024

Question 21

What does APIPA stand for, and what is its purpose?

a) Automatic Public IP Addressing, assigns public IP addresses
b) Automatic Private IP Addressing, assigns an IP address when DHCP fails
c) Advanced Protocol Internet Assignment, encrypts data traffic
d) Automatic Packet IP Assignment, manages data transmission

Correct Answer: b) Automatic Private IP Addressing, assigns an IP address when DHCP fails

Explanation: APIPA is a feature that assigns a local IP address from a reserved range when a DHCP server cannot be reached, allowing basic network communication.

Question 22

What does SNMP (Simple Network Management Protocol) enable?

a) Dynamic IP address assignment
b) Centralized management and monitoring of network devices
c) Encryption of data packets
d) Direct access to network servers

Correct Answer: b) Centralized management and monitoring of network devices

Explanation: SNMP allows network administrators to manage and monitor network devices such as switches, routers, and servers from a central location.

Question 23

What is the purpose of an SSL (Secure Sockets Layer) certificate?

a) To encrypt data transmitted between a web server and a client
b) To assign IP addresses to devices on a network
c) To filter traffic based on security rules
d) To resolve domain names to IP addresses

Correct Answer: a) To encrypt data transmitted between a web server and a client

Explanation: SSL certificates provide encryption to secure communication between a client (e.g., a web browser) and a server, protecting sensitive information like passwords.

Question 24

Which device creates separate collision domains within a network?

a) Repeater
b) Router
c) Switch
d) Hub

Correct Answer: c) Switch

Explanation: A switch operates at Layer 2 of the OSI model and creates separate collision domains for each connected device, improving network efficiency and reducing data collisions.

Question 25

What does WPA2 use to enhance wireless network security?

a) WEP encryption
b) AES encryption
c) DES encryption
d) SSL encryption

Correct Answer: b) AES encryption

Explanation: WPA2 uses Advanced Encryption Standard (AES), a more secure encryption method compared to WEP, to protect wireless network communications.

Question 26

Which protocol is commonly used for transferring large files between computers?

a) HTTP
b) SMTP
c) FTP
d) IMAP

Correct Answer: c) FTP

Explanation: File Transfer Protocol (FTP) is commonly used to transfer large files between computers over a network.

Question 27

Which backup method only backs up data that has changed since the last full or incremental backup?

a) Full backup
b) Incremental backup
c) Differential backup
d) Mirror backup

Correct Answer: b) Incremental backup

Explanation: Incremental backups only save data that has changed since the last backup (either full or incremental), making them faster and more efficient than full backups.

Question 28

What is the primary function of the transport layer in the OSI model?

a) To manage data flow between networks
b) To ensure reliable data transfer between devices
c) To assign IP addresses to devices
d) To encrypt data packets for secure transmission

Correct Answer: b) To ensure reliable data transfer between devices

Explanation: The transport layer (Layer 4) is responsible for reliable data transfer, managing error correction, and packet sequencing between devices.

Question 29

Which address type is used by routers to deliver packets to multiple destinations at once?

a) Unicast address
b) Multicast address
c) Anycast address
d) Broadcast address

Correct Answer: b) Multicast address

Explanation: Multicast addresses allow routers to send packets to multiple specific destinations simultaneously, improving network efficiency in scenarios like video streaming.

Question 30

What is a “cold spare” in network hardware?

a) A backup device that is always powered on and ready to replace a failed component
b) A backup device that is stored and used only when needed
c) A device used to amplify network signals
d) A spare switch that is automatically used in case of failure

Correct Answer: b) A backup device that is stored and used only when needed

Explanation: A cold spare is a backup device that is kept in storage and only used when needed to replace a failed component.

Question 31

What type of network device is responsible for assigning IP addresses to devices on a network?

a) Router
b) DHCP server
c) Switch
d) Hub

Correct Answer: b) DHCP server

Explanation: A DHCP server automatically assigns IP addresses to devices on a network, simplifying network management.

Question 32

What does the presentation layer of the OSI model handle?

a) Physical transmission of data
b) Error correction and flow control
c) Data encryption and formatting for the application layer
d) Network routing and addressing

Correct Answer: c) Data encryption and formatting for the application layer

Explanation: The presentation layer (Layer 6) ensures data is properly formatted, encrypted, and compressed before it is passed to the application layer.

Question 33

What is a common method of authenticating users in network security?

a) MAC filtering
b) Kerberos
c) DNS resolution
d) SNMP

Correct Answer: b) Kerberos

Explanation: Kerberos is a network authentication protocol that uses tickets and encryption to securely authenticate users on a network.

Question 34

Which protocol is used to resolve IP addresses to MAC addresses?

a) DNS
b) DHCP
c) ARP
d) ICMP

Correct Answer: c) ARP

Explanation: The Address Resolution Protocol (ARP) is used to resolve IP addresses to MAC addresses, allowing devices to communicate on a local network.

Question 35

What is the primary purpose of a firewall in network security?

a) To encrypt all network traffic
b) To filter incoming and outgoing traffic based on predefined rules
c) To assign IP addresses to devices on a network
d) To amplify network signals

Correct Answer: b) To filter incoming and outgoing traffic based on predefined rules

Explanation: A firewall filters network traffic to prevent unauthorized access and protect the network from external threats.

Question 36

What is the function of an IDS (Intrusion Detection System)?

a) To detect unauthorized access or malicious activity in a network
b) To assign IP addresses to devices
c) To block unwanted traffic from entering the network
d) To encrypt data transmissions

Correct Answer: a) To detect unauthorized access or malicious activity in a network

Explanation: An IDS monitors network traffic for suspicious activity, alerting administrators if unauthorized access or attacks are detected.

Question 37

What does the acronym SSH stand for?

a) Secure Shell
b) Secure Hyperlink
c) Simple Shell
d) Secure HTTP

Correct Answer: a) Secure Shell

Explanation: SSH stands for Secure Shell, a protocol used to securely access and manage remote systems over a network.

Question 38

What does MTU (Maximum Transmission Unit) refer to in networking?

a) The maximum amount of data that can be transmitted per second
b) The largest size of a data packet that can be transmitted
c) The number of devices that can be connected to a network
d) The maximum number of hops in a network

Correct Answer: b) The largest size of a data packet that can be transmitted

Explanation: The MTU is the maximum size of a data packet that can be transmitted over a network, impacting network efficiency and performance.

Question 39

What is a VLAN used for in network management?

a) To encrypt data packets for secure transmission
b) To logically segment a network into smaller parts
c) To assign IP addresses dynamically
d) To amplify wireless network signals

Correct Answer: b) To logically segment a network into smaller parts

Explanation: A VLAN allows a network to be divided into separate segments, improving security and traffic management without requiring physical separation.

Question 40

Which protocol is used to send email from a client to a server?

a) SMTP
b) IMAP
c) FTP
d) HTTP

Correct Answer: a) SMTP

Explanation: Simple Mail Transfer Protocol (SMTP) is used for sending email from a client to an email server and for server-to-server email transmission.

Complete the Captcha to view next question set.

Prev Post
WGU D413 Practice Exam Questions – Set 2 – Part 1
Next Post
WGU D413 Practice Exam Questions – Set 2 – Part 3