OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • November 17, 2024

Question 01

Which OSI model layer is responsible for the segment protocol data unit?

a) Network
b) Transport
c) Application
d) Data link

Correct Answer: b) Transport

Explanation: The transport layer of the OSI model is responsible for segmenting and reassembling data for efficient communication between networked systems. It ensures reliable data transfer and provides error-checking mechanisms.

Question 02

Which protocol in the software-defined networking (SDN) framework is responsible for defining the communication between the controller and a network device?

a) OpenFlow
b) Telnet
c) Point-to-point
d) Address resolution

Correct Answer: a) OpenFlow

Explanation: OpenFlow is the primary protocol in SDN that defines how controllers communicate with forwarding devices like routers and switches. It allows the SDN controller to manage flow tables, control traffic, and interact with the data plane.

Question 03

Which network automation tool is open source?

a) BlueCat Gateway
b) Chef
c) Ansible
d) Puppet Enterprise

Correct Answer: c) Ansible

Explanation: Ansible is an open-source automation tool that simplifies configuration management, application deployment, and task automation without the need for agents. It is widely adopted for network automation tasks.

Question 04

What is a benefit of using network automation?

a) Backing up and restoring data
b) Using infrastructure as code to maintain a reliable state
c) Dynamic allocation of IP addresses
d) Boosting storage

Correct Answer: b) Using infrastructure as code to maintain a reliable state

Explanation: Network automation allows infrastructure to be treated as code, ensuring that configurations remain consistent and easily manageable. This leads to more reliable network operations and reduces the chances of configuration drift.

Question 05

Which service introduces flexibility, dynamism, and automation into the management of network objects?

a) Open source for network functions virtualization (NFV)
b) OpenStack
c) Network functions virtualization (NFV)
d) Software-defined networking (SDN)

Correct Answer: d) Software-defined networking (SDN)

Explanation: SDN introduces flexibility, dynamism, and automation by decoupling the control plane from the data plane. This allows for centralized management of network resources and real-time configuration of network traffic.

Question 06

Which OpenStack unit provides authentication?

a) Cinder
b) Nova
c) Keystone
d) Neutron

Correct Answer: c) Keystone

Explanation: Keystone is the OpenStack module responsible for providing authentication services. It manages identity services and handles authorization across the OpenStack environment.

Question 07

Which interface in SDN allows the controller to communicate, interact, and manage forwarding elements?

a) Westbound
b) Flow ID
c) Southbound
d) Eastbound

Correct Answer: c) Southbound

Explanation: The southbound interface in SDN enables the controller to communicate with forwarding devices, such as switches and routers, and manage the flow of data between them.

Question 08

Which OpenFlow SDN controller has a multi-threaded, cross-platform, and modular emphasis?

a) FlowVisor
b) OpenDaylight (ODL) Project
c) Floodlight
d) Beacon

Correct Answer: d) Beacon

Explanation: Beacon is a Java-based, multi-threaded SDN controller designed to be modular and cross-platform, making it a popular choice for SDN research and development.

Question 09

Which port number is used as the destination of a server by Dynamic Host Configuration Protocol (DHCP)?

a) 23
b) 53
c) 67
d) 68

Correct Answer: c) 67

Explanation: DHCP uses port 67 as the destination port on the server side to receive requests from clients for IP address assignment.

Question 10

Which IPv6 address identifies each network interface?

a) Multicast
b) Broadcast
c) Anycast
d) Unicast

Correct Answer: c) Anycast

Explanation: In IPv6, anycast addresses are used to route data to the nearest network interface in a group of interfaces that share the same anycast address.

Question 11

Which network virtualization (NV) approach refers to a logical local area network (LAN) based on physical LANs?

a) Virtual private networks (VPN)
b) Virtual private LAN services (VPLS)
c) Virtual LANs (VLANs)
d) Wide area network (WAN)

Correct Answer: c) Virtual LANs (VLANs)

Explanation: VLANs are a type of network virtualization that allows multiple logical LANs to coexist on the same physical network infrastructure, improving network management and security.

Question 12

Which network virtualization benefit involves using virtual networks to create slices to reserve networking resources?

a) Debugging and intrusion detection
b) Resource optimization
c) Mobility
d) Testing/quality assurance

Correct Answer: a) Debugging and intrusion detection

Explanation: Virtual networks enable debugging and intrusion detection by creating network slices that reserve specific resources for monitoring and analysis, improving security and troubleshooting.

Question 13

Which layer 2 virtual networking device is responsible for controlling data frames to connected devices?

a) Router
b) Hub
c) Bridge
d) Switch

Correct Answer: d) Switch

Explanation: A switch is a layer 2 device responsible for controlling data frames and forwarding them to the correct destination within the local network based on MAC addresses.

Question 14

Which virtual networking protocol is used to support VPNs and does not provide encryption?

a) Layer 2 Tunneling Protocol (L2TP)
b) Point-to-Point Protocol (PPP)
c) Internet Key Exchange version 2 (IKEv2)
d) Secure Socket Layer (SSL)

Correct Answer: a) Layer 2 Tunneling Protocol (L2TP)

Explanation: L2TP is used to create virtual private networks (VPNs) but does not provide encryption on its own, relying on protocols like IPsec for encryption and confidentiality.

Question 15

What is the AAA mechanism responsible for granting user privileges to network resources?

a) Authorization
b) Authentication
c) Accounting
d) Availability

Correct Answer: a) Authorization

Explanation: Authorization is the process of granting users permission to access network resources based on their identity and credentials, as verified through authentication.

Question 16

Which authentication type validates a user based on what the person knows?

a) Retinal scans
b) Swipe card
c) Password
d) Unique tokens

Correct Answer: c) Password

Explanation: Passwords are a common authentication method based on what the user knows, such as a secret phrase or combination, to validate their identity.

Question 17

Which phase of an attack involves the attacker gathering information about the target?

a) Escalating privileges
b) Exploiting the system
c) Clearing tracks
d) Reconnaissance

Correct Answer: d) Reconnaissance

Explanation: The reconnaissance phase is when an attacker collects information about the target system or network before launching an attack.

Question 18

Which term refers to a weakness or gap in a security system that can be exploited by an attacker?

a) Threat
b) Vulnerability
c) Attack
d) Risk

Correct Answer: b) Vulnerability

Explanation: A vulnerability is a weakness or flaw in a system that can be exploited by an attacker to cause harm or gain unauthorized access.

Question 19

Which cyber kill chain term implies actual detonation of the attack?

a) Exploitation
b) Command and control
c) Installation
d) Delivery

Correct Answer: a) Exploitation

Explanation: Exploitation refers to the phase where the attacker uses a vulnerability to execute the attack, causing the intended damage or unauthorized access.

Question 20

Which defensive in-depth mechanism watches activities on systems and networks to determine attacks and repair the damages?

a) Preventive solutions
b) Detection and response
c) Survivability and recovery
d) Reconnaissance

Correct Answer: b) Detection and response

Explanation: Detection and response mechanisms monitor system activities to detect attacks in progress and initiate response actions to repair damage and mitigate threats.

Complete the Captcha to view next question set.

Prev Post
WGU D420 Practice Exam Questions – Set 5 – Part 3
Next Post
WGU D415 Practice Exam Questions – Set 1 – Part 2