OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • November 18, 2024

Question 01

What is the function of an ad hoc network?

a) It connects devices through a centralized access point
b) It allows devices to connect directly without a wireless access point
c) It encrypts wireless data transmission
d) It provides dynamic IP addresses for connected devices

Correct Answer: b) It allows devices to connect directly without a wireless access point

Explanation: In an ad hoc network, devices communicate directly with each other without using a centralized access point, often used for temporary or small-scale wireless networks.

Question 02

What type of device is used to protect a system from power spikes and surges?

a) Uninterruptible Power Supply (UPS)
b) Firewall
c) Surge protector
d) Modem

Correct Answer: c) Surge protector

Explanation: A surge protector shields electronic devices from voltage spikes by blocking or shorting to ground any unwanted voltage above a safe threshold.

Question 03

What does the term “backbone” refer to in networking?

a) A primary network cable that connects various segments of a network
b) A wireless signal booster
c) A firewall that protects a network
d) A device that resolves domain names to IP addresses

Correct Answer: a) A primary network cable that connects various segments of a network

Explanation: The backbone in a network refers to the main transmission path that connects various smaller segments of a network, often carrying large amounts of traffic.

Question 04

What does the acronym ISDN stand for?

a) Internet Standard Dial Network
b) Integrated Services Digital Network
c) Internet Services Data Network
d) International Standard Digital Network

Correct Answer: b) Integrated Services Digital Network

Explanation: ISDN stands for Integrated Services Digital Network, a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the public switched telephone network.

Question 05

What does a proxy server typically do?

a) Encrypts all outgoing network traffic
b) Acts as an intermediary between a client and a server for security purposes
c) Resolves domain names to IP addresses
d) Assigns dynamic IP addresses to network devices

Correct Answer: b) Acts as an intermediary between a client and a server for security purposes

Explanation: A proxy server serves as an intermediary between a client and another server, often used to improve security, control access, or cache content.

Question 06

Which network topology is characterized by each node being connected to every other node?

a) Star topology
b) Bus topology
c) Mesh topology
d) Ring topology

Correct Answer: c) Mesh topology

Explanation: In a mesh topology, every node connects to every other node, ensuring redundancy and providing multiple paths for data to travel through the network.

Question 07

What is the primary purpose of a firewall in a network?

a) To amplify weak network signals
b) To filter network traffic based on security rules
c) To assign IP addresses to devices on a network
d) To route data between networks

Correct Answer: b) To filter network traffic based on security rules

Explanation: A firewall monitors and controls incoming and outgoing network traffic based on predefined security rules, protecting the network from unauthorized access and threats.

Question 08

What does a MAC (Media Access Control) address uniquely identify?

a) A physical network interface device
b) An IP address assigned to a device
c) A protocol used to secure communications
d) A network topology

Correct Answer: a) A physical network interface device

Explanation: A MAC address is a unique identifier assigned to a network interface card (NIC) for communication at the data link layer of a network.

Question 09

What is a demilitarized zone (DMZ) in network security?

a) A wireless network protected by encryption
b) A network segment that isolates public-facing servers from the internal network
c) A protocol used to secure remote connections
d) A backup system that automatically takes over in case of failure

Correct Answer: b) A network segment that isolates public-facing servers from the internal network

Explanation: A DMZ is a section of a network that contains publicly accessible resources, such as web servers, while keeping them isolated from the internal network for security reasons.

Question 10

Which protocol is used to map a MAC address to an IP address?

a) DNS
b) ARP
c) DHCP
d) FTP

Correct Answer: b) ARP

Explanation: Address Resolution Protocol (ARP) is used to map an IP address to the corresponding MAC address, enabling devices on a network to communicate.

Question 11

What is attenuation in networking?

a) The strengthening of a signal over distance
b) The encryption of data for secure transmission
c) The loss of signal strength over distance
d) The interference caused by electromagnetic waves

Correct Answer: c) The loss of signal strength over distance

Explanation: Attenuation refers to the reduction in signal strength as it travels over a distance, which can result in weaker and less reliable data transmission.

Question 12

Which type of IP address is used to send data to all devices on a network?

a) Unicast address
b) Broadcast address
c) Anycast address
d) Multicast address

Correct Answer: b) Broadcast address

Explanation: A broadcast address sends data to all devices on a network, typically used for network-wide communications like DHCP requests.

Question 13

What is the function of a DNS server?

a) To assign IP addresses automatically to devices on a network
b) To map domain names to IP addresses
c) To encrypt data transmitted between devices
d) To route data between different networks

Correct Answer: b) To map domain names to IP addresses

Explanation: A DNS server resolves human-readable domain names (like www.example.com) to numerical IP addresses, allowing easier navigation and access to websites.

Question 14

What is the main function of the transport layer in the OSI model?

a) To route data between networks
b) To provide error correction and ensure data is delivered reliably
c) To manage encryption and compression of data
d) To handle the physical transmission of data

Correct Answer: b) To provide error correction and ensure data is delivered reliably

Explanation: The transport layer (Layer 4) is responsible for ensuring reliable data transfer by managing error correction, packet sequencing, and flow control.

Question 15

What type of topology uses a central device to connect all nodes?

a) Star topology
b) Bus topology
c) Ring topology
d) Mesh topology

Correct Answer: a) Star topology

Explanation: In a star topology, all network nodes are connected to a central device such as a hub or switch, which manages the communication between them.

Question 16

Which protocol allows multiple VLANs to communicate over a single network link?

a) STP
b) ARP
c) VLAN Trunking Protocol (VTP)
d) IPsec

Correct Answer: c) VLAN Trunking Protocol (VTP)

Explanation: VLAN Trunking Protocol (VTP) allows multiple VLANs to communicate across a single network link by tagging VLANs with identifiers.

Question 17

What is a “hot spare” in a RAID configuration?

a) A backup hard drive that automatically replaces a failed drive without user intervention
b) A hard drive that requires manual installation when another drive fails
c) A network device that boosts wireless signals
d) A temporary IP address assigned by a DHCP server

Correct Answer: a) A backup hard drive that automatically replaces a failed drive without user intervention

Explanation: In a RAID configuration, a hot spare is a backup drive that is immediately used to replace a failed drive, ensuring data redundancy and fault tolerance.

Question 18

What does a DHCP server do in a network?

a) Encrypts data transmissions
b) Filters network traffic
c) Assigns IP addresses dynamically to devices
d) Maps MAC addresses to IP addresses

Correct Answer: c) Assigns IP addresses dynamically to devices

Explanation: A DHCP server automatically assigns IP addresses to devices on a network, streamlining the process of network configuration and management.

Question 19

What is a rogue access point?

a) A wireless access point that is encrypted with WPA2
b) A wireless access point installed without authorization
c) A firewall that filters network traffic
d) A repeater that extends the range of a network

Correct Answer: b) A wireless access point installed without authorization

Explanation: A rogue access point is an unauthorized device added to a network, which can pose a significant security risk by providing unmonitored entry points.

Question 20

What is a common cause of signal interference in wireless networks?

a) Increased bandwidth
b) Electromagnetic interference (EMI)
c) Strong encryption methods
d) Dynamic IP addressing

Correct Answer: b) Electromagnetic interference (EMI)

Explanation: Electromagnetic interference (EMI) can cause signal interference in wireless networks, resulting in reduced performance or dropped connections.

Complete the Captcha to view next question set.

Prev Post
WGU D413 Practice Exam Questions – Set 2 – Part 3
Next Post
WGU D413 Practice Exam Questions – Set 3 – Part 2