OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • December 4, 2024

Question 41

Which of the following describes the process of securing data by converting it into a format that cannot be read by unauthorized users?

A. Hashing
B. Tokenization
C. Encryption
D. Firewalling

Correct Answer: C. Encryption

Explanation: Encryption secures data by converting it into unreadable code that can only be decrypted by authorized parties. Hashing, tokenization, and firewalling serve different purposes.

Question 42

Which of the following is used to ensure the availability of systems and data in the event of a disaster?

A. Data encryption
B. Backup and recovery
C. Tokenization
D. Intrusion Prevention System

Correct Answer: B. Backup and recovery

Explanation: Backup and recovery ensure that data and systems are available after a disaster, allowing organizations to restore operations. Encryption, tokenization, and intrusion prevention systems provide different protections.

Question 43

Which of the following is a method used to protect against password-cracking attempts by adding random data to passwords before hashing?

A. Tokenization
B. Salting
C. Encryption
D. Multi-factor authentication

Correct Answer: B. Salting

Explanation: Salting adds random data to passwords before hashing them, making it harder for attackers to crack them. Tokenization, encryption, and multi-factor authentication serve different purposes.

Question 44

Which of the following refers to the ability of a system to continue functioning even in the event of a component failure?

A. Availability
B. Integrity
C. Confidentiality
D. Fault tolerance

Correct Answer: D. Fault tolerance

Explanation: Fault tolerance refers to a system's ability to continue functioning despite the failure of one or more components. Availability ensures access to data, integrity protects data accuracy, and confidentiality restricts access to authorized users.

Question 45

Which of the following types of malware is designed to appear as legitimate software but performs malicious activities?

A. Virus
B. Worm
C. Trojan
D. Ransomware

Correct Answer: C. Trojan

Explanation: A Trojan appears as legitimate software but performs malicious activities in the background. Viruses, worms, and ransomware behave differently.

Question 46

Which of the following best describes an attack where the attacker attempts to exploit a software vulnerability that has not yet been patched?

A. Man-in-the-middle
B. Brute-force
C. SQL injection
D. Zero-day

Correct Answer: D. Zero-day

Explanation: A zero-day attack exploits a software vulnerability that is not yet known or patched. The other attacks target different aspects of security.

Question 47

Which of the following protocols is used to encrypt communication over the internet?

A. FTP
B. SSH
C. HTTP
D. SMTP

Correct Answer: B. SSH

Explanation: SSH (Secure Shell) is used to encrypt communication over the internet, providing a secure channel. FTP, HTTP, and SMTP are older or less secure protocols.

Question 48

Which of the following ensures that data is accessible to authorized users when needed?

A. Integrity
B. Confidentiality
C. Availability
D. Encryption

Correct Answer: C. Availability

Explanation: Availability ensures that data is accessible to authorized users when needed. Integrity protects data accuracy, confidentiality restricts access, and encryption secures data.

Question 49

Which of the following is used to ensure that only authorized devices can connect to a wireless network?

A. VPN
B. MAC filtering
C. Tokenization
D. Hashing

Correct Answer: B. MAC filtering

Explanation: MAC filtering ensures that only authorized devices, based on their MAC addresses, can connect to a wireless network. VPN, tokenization, and hashing are different methods.

Question 50

Which of the following is the main purpose of hashing?

A. To protect data during transmission
B. To verify the integrity of data
C. To encrypt data at rest
D. To manage access control

Correct Answer: B. To verify the integrity of data

Explanation: Hashing is used to verify the integrity of data by producing a unique digital fingerprint. It is not used for encryption or access control.

Complete the Captcha to view next question set.

Prev Post
WGU D329 Practice Exam Questions – Set 3 – Part 2
Next Post
WGU D329 Practice Exam Questions – Set 4 – Part 1