OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • November 28, 2024

Question 41

Which term refers to a malicious program that masquerades as legitimate software?

a) Worm
b) Spyware
c) Trojan horse
d) Keylogger

 

Correct Answer: c) Trojan horse

Explanation: A Trojan horse appears to be legitimate software but performs malicious actions once it is executed.

Question 42

Which protocol is responsible for sending email over the internet?

a) HTTP
b) FTP
c) SMTP
d) DNS

Correct Answer: c) SMTP

Explanation: Simple Mail Transfer Protocol (SMTP) is used for sending emails between servers over the internet.

Question 43

What does the term ‘two-factor authentication’ mean?

a) To store data permanently
b) To process data
c) To store data temporarily for quick access
d) To provide backup power

Correct Answer: c) To store data temporarily for quick access

Explanation: RAM (Random Access Memory) temporarily stores data that is being actively used by the CPU for quick access.

Question 44

What is a key characteristic of structured data?

a) It is unorganized and difficult to process
b) It follows a fixed format and is well-labeled
c) It is data collected from social media
d) It is data stored in binary format

Correct Answer: b) It follows a fixed format and is well-labeled

Explanation: Structured data follows a fixed format and is stored in traditional databases, making it easier to process and query.

Question 45

Which protocol is used to transfer files over the internet?

a) SMTP
b) FTP
c) IMAP
d) POP3

Correct Answer: b) FTP

Explanation: FTP (File Transfer Protocol) is used to transfer files between computers over the internet or a network.

Question 46

What is the purpose of a network switch in a LAN?

a) To connect different networks together
b) To block unauthorized access
c) To manage and direct data traffic within a LAN
d) To encrypt network traffic

Correct Answer: c) To manage and direct data traffic within a LAN

Explanation: A network switch is used to direct data traffic within a LAN by sending data packets to the correct device.

Question 47

 Which type of encryption uses the same key for both encryption and decryption?

a) Asymmetric encryption
b) Public key encryption
c) Symmetric encryption
d) One-time pad

Correct Answer: c) Symmetric encryption

Explanation: Symmetric encryption uses the same key for both encryption and decryption, making it faster but requiring secure key management.

Question 48

Which device is responsible for routing data between different networks?

a) Switch
b) Router
c) Hub
d) Repeater

Correct Answer: b) Router

Explanation: A router directs data between different networks, often connecting a local network to the internet.

Question 49

What does the term ‘phishing’ refer to in cybersecurity?

a) Unauthorized access to a network
b) Sending fraudulent emails to trick recipients into revealing sensitive information
c) The practice of encrypting data
d) The process of backing up data

Correct Answer: b) Sending fraudulent emails to trick recipients into revealing sensitive information

Explanation: Phishing involves sending deceptive emails or messages to trick individuals into providing sensitive information, such as passwords or credit card details.

Question 50

Which of the following is a key benefit of cloud computing?

a) High upfront costs
b) Limited storage options
c) Remote accessibility and scalability
d) Dedicated physical infrastructure

Correct Answer: c) Remote accessibility and scalability

Explanation: Cloud computing offers remote access to resources and the ability to scale services as needed, making it a flexible and cost-effective solution.

Tags

Prev Post
WGU D075 Practice Exam Questions – Set 5 – Part 2
Next Post
WGU D320 Practice Exam Questions – Set 1 – Part 2