OA Exams

  • web.groovymark@gmail.com
  • November 18, 2024

Question 41

What does a Trojan horse do in network security?

a) It encrypts data to prevent unauthorized access
b) It disguises itself as a legitimate program to gain access to a system
c) It floods a network with excessive traffic to cause disruption
d) It intercepts network traffic to steal data

Correct Answer: b) It disguises itself as a legitimate program to gain access to a system

Explanation: A Trojan horse is malware that appears to be a legitimate program but contains malicious code that can harm or compromise a system.

Question 42

Which of the following protocols is designed for streaming audio and video in real-time?

a) FTP
b) RTP
c) IMAP
d) SMTP

Correct Answer: b) RTP

Explanation: Real-Time Transport Protocol (RTP) is designed to deliver audio and video data in real-time over IP networks.

Question 43

What is the primary function of NAT (Network Address Translation)?

a) To resolve domain names to IP addresses
b) To allow devices with private IP addresses to access public networks
c) To assign IP addresses dynamically to devices
d) To encrypt network traffic for secure communication

Correct Answer: b) To allow devices with private IP addresses to access public networks

Explanation: NAT allows devices on a private network to access public networks like the internet by translating private IP addresses into public ones.

Question 44

What does the acronym VPN stand for in networking?

a) Virtual Port Number
b) Virtual Packet Node
c) Virtual Private Network
d) Virtual Protocol Network

Correct Answer: c) Virtual Private Network

Explanation: A Virtual Private Network (VPN) creates a secure, encrypted connection over a public network, allowing users to access private resources remotely.

Question 45

What is the purpose of Kerberos in network security?

a) To filter network traffic based on MAC addresses
b) To encrypt data transmissions for secure communication
c) To authenticate users and devices on a network
d) To assign dynamic IP addresses to devices

Correct Answer: c) To authenticate users and devices on a network

Explanation: Kerberos is a network authentication protocol that securely verifies the identity of users and devices on a network.

Question 46

What is the primary function of the physical layer in the OSI model?

a) To handle logical addressing and routing
b) To manage encryption and data formatting
c) To transmit raw data over a physical medium
d) To ensure reliable data transfer between devices

Correct Answer: c) To transmit raw data over a physical medium

Explanation: The physical layer (Layer 1) is responsible for transmitting raw data bits over a physical medium, such as cables or wireless signals.

Question 47

Which device is commonly used to connect multiple networks together?

a) Switch
b) Hub
c) Router
d) Repeater

Correct Answer: c) Router

Explanation: A router connects multiple networks together and directs data traffic between them based on IP addresses, ensuring efficient communication.

Question 48

What is the purpose of a “hot spare” in network hardware?

a) A backup device that automatically replaces a failed component without human intervention
b) A backup device that is stored and used only when needed
c) A device used to amplify network signals
d) A switch that is used to connect wireless devices to a network

Correct Answer: a) A backup device that automatically replaces a failed component without human intervention

Explanation: A hot spare is a backup device that is always powered on and can automatically replace a failed system component without requiring manual intervention.

Question 49

Which protocol is used for downloading email messages to a client?

a) IMAP
b) SMTP
c) FTP
d) HTTP

Correct Answer: a) IMAP

Explanation: IMAP (Internet Message Access Protocol) allows email clients to download and synchronize messages from a mail server.

Question 50

What does the term “jitter” refer to in network performance?

a) A delay in the transmission of data packets
b) Variability in the timing of packet delivery
c) Loss of signal strength over a network
d) The encryption of data packets for security

Correct Answer: b) Variability in the timing of packet delivery

Explanation: Jitter refers to small variations in the timing of data packet delivery, which can cause disruptions in the quality of real-time communications like voice and video.

Complete the Captcha to view next question set.

Prev Post
WGU D413 Practice Exam Questions – Set 2 – Part 2
Next Post
WGU D413 Practice Exam Questions – Set 3 – Part 1