OA Exams

  • web.groovymark@gmail.com
  • November 18, 2024

Question 21

Which type of address is used by a router to deliver packets to a single recipient?

a) Multicast address
b) Unicast address
c) Anycast address
d) Broadcast address

Correct Answer: b) Unicast address

Explanation: A unicast address is used to send data to a single recipient, such as when a router directs packets to one specific device on the network.

Question 22

Which encryption method uses a pair of keys: one public and one private?

a) Symmetric-key encryption
b) Hash-based encryption
c) Asymmetric-key encryption
d) Stream cipher encryption

Correct Answer: c) Asymmetric-key encryption

Explanation: Asymmetric-key encryption uses two different keys: a public key for encryption and a private key for decryption, ensuring secure communication.

Question 23

 What does a RAID system provide in terms of data management?

a) Faster network speeds
b) Dynamic IP addressing
c) Data redundancy and fault tolerance
d) Encryption of sensitive data

Correct Answer: c) Data redundancy and fault tolerance

Explanation: A RAID (Redundant Array of Independent Disks) system provides redundancy by storing copies of data across multiple hard drives, improving fault tolerance and preventing data loss in case of hardware failure.

Question 24

What is a major difference between IPv4 and IPv6 addressing?

a) IPv4 addresses are longer than IPv6 addresses
b) IPv6 uses a 128-bit address, while IPv4 uses a 32-bit address
c) IPv4 can support more devices than IPv6
d) IPv6 addresses are encrypted, while IPv4 addresses are not

Correct Answer: b) IPv6 uses a 128-bit address, while IPv4 uses a 32-bit address

Explanation: IPv6 addresses are 128-bit, allowing for a much larger address space compared to IPv4's 32-bit addressing scheme.

Question 25

What is the purpose of NAT (Network Address Translation)?

a) To resolve domain names to IP addresses
b) To allow devices with private IP addresses to communicate with public networks
c) To encrypt data for secure transmission
d) To filter network traffic based on predefined security rules

Correct Answer: b) To allow devices with private IP addresses to communicate with public networks

Explanation: NAT enables devices on a private network to access the internet by translating private IP addresses into public IP addresses.

Question 26

What does APIPA (Automatic Private IP Addressing) do in the absence of a DHCP server?

a) It assigns a public IP address to devices on the network
b) It assigns a private IP address from a reserved range
c) It encrypts data for secure communication
d) It maps domain names to IP addresses

Correct Answer: b) It assigns a private IP address from a reserved range

Explanation: APIPA automatically assigns a private IP address to devices when a DHCP server is unavailable, allowing local communication.

Question 27

What is the primary purpose of a router in a network?

a) To assign dynamic IP addresses
b) To filter data packets based on security rules
c) To route data packets between different networks
d) To amplify network signals

Correct Answer: c) To route data packets between different networks

Explanation: A router is responsible for directing data packets between different networks, ensuring they reach the correct destination.

Question 28

What type of backup method copies all data regardless of changes?

a) Differential backup
b) Full backup
c) Incremental backup
d) Mirror backup

Correct Answer: b) Full backup

Explanation: A full backup copies all data, regardless of whether it has changed since the last backup, ensuring a complete data set is saved.

Question 29

What is an example of a physical layer device in the OSI model?

a) Router
b) Switch
c) Hub
d) Firewall

Correct Answer: c) Hub

Explanation: A hub operates at the physical layer (Layer 1) of the OSI model, transmitting data without any filtering or routing.

Question 30

What does a VLAN (Virtual Local Area Network) allow you to do?

a) Encrypt network traffic between devices
b) Segment a network into logical parts without physical separation
c) Automatically assign IP addresses
d) Amplify weak signals in a network

Correct Answer: b) Segment a network into logical parts without physical separation

Explanation: VLANs allow you to logically segment a network, improving traffic management and security without needing separate physical networks.

Question 31

Which protocol is responsible for email retrieval from a server?

a) SMTP
b) HTTP
c) FTP
d) IMAP

Correct Answer: d) IMAP

Explanation: IMAP (Internet Message Access Protocol) is used for retrieving and managing email from a server, allowing for synchronization between devices.

Question 32

Which security protocol is designed to make a wireless network as secure as a wired one?

a) WEP
b) WPA2
c) SSL
d) HTTPS

Correct Answer: a) WEP

Explanation: WEP (Wired Equivalent Privacy) was designed to provide wireless networks with security comparable to that of wired networks, though it is now considered insecure.

Question 33

What is the purpose of a patch panel in a network?

a) To terminate and manage network cables
b) To encrypt network traffic
c) To amplify network signals
d) To assign dynamic IP addresses

Correct Answer: a) To terminate and manage network cables

Explanation: A patch panel is used to terminate and organize network cables, providing an easy way to manage and connect network wiring in a central location.

Question 34

What type of cable is RG-58, and what is it commonly used for?

a) Coaxial cable used for Ethernet networking
b) Twisted-pair cable used for telephone lines
c) Fiber-optic cable used for long-distance communication
d) Shielded cable used for electrical wiring

Correct Answer: a) Coaxial cable used for Ethernet networking

Explanation: RG-58 is a type of coaxial cable commonly used in 10Base2 Ethernet networks, known as thinnet, due to its relatively small diameter.

Question 35

Which type of wireless network allows two devices to communicate directly without an access point?

a) Infrastructure mode
b) Ad hoc mode
c) WPA2
d) CSMA/CA

Correct Answer: b) Ad hoc mode

Explanation: In ad hoc mode, devices communicate directly with each other without the need for an access point, often used for temporary or small-scale wireless networks.

Question 36

What is the purpose of a backup system in network management?

a) To encrypt data for secure transmission
b) To provide fault tolerance and data recovery in case of system failure
c) To assign dynamic IP addresses
d) To filter network traffic

Correct Answer: b) To provide fault tolerance and data recovery in case of system failure

Explanation: A backup system ensures data is recoverable in case of hardware or software failure, helping to prevent data loss and maintain business continuity.

Question 37

What does DNSSEC provide for DNS queries?

a) Encryption of DNS requests
b) Digital signatures to ensure the authenticity of DNS responses
c) Dynamic IP address assignment
d) Resolution of domain names to IP addresses

Correct Answer: b) Digital signatures to ensure the authenticity of DNS responses

Explanation: DNSSEC (Domain Name System Security Extensions) adds security to DNS queries by using digital signatures to ensure the authenticity and integrity of DNS data.

Question 38

What type of cable is used in a bus topology?

a) Twisted-pair
b) Coaxial cable
c) Fiber-optic cable
d) USB cable

Correct Answer: b) Coaxial cable

Explanation: Coaxial cable is commonly used in bus topology networks, where all devices share a single communication line.

Question 39

What is a key advantage of fiber-optic cables over copper cables in networking?

a) Lower cost
b) Resistance to electromagnetic interference
c) Simplicity of installation
d) Better support for legacy systems

Correct Answer: b) Resistance to electromagnetic interference

Explanation: Fiber-optic cables are immune to electromagnetic interference, making them ideal for high-speed data transmission over long distances without signal degradation.

Question 40

What is the purpose of an encryption protocol in network security?

a) To assign dynamic IP addresses
b) To ensure that data is only accessible to authorized users
c) To map domain names to IP addresses
d) To amplify weak signals in a network

Correct Answer: b) To ensure that data is only accessible to authorized users

Explanation: Encryption protocols secure data by encoding it so that only authorized users with the correct decryption keys can access the original information.

Complete the Captcha to view next question set.

Prev Post
WGU D413 Practice Exam Questions – Set 3 – Part 1
Next Post
WGU D413 Practice Exam Questions – Set 3 – Part 3