OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • December 4, 2024

Question 21

Which of the following best describes a honeypot?

A. A system used to attack other systems
B. A high-value system that attackers target
C. A decoy system set up to attract and trap attackers
D. A system used to scan for vulnerabilities

Correct Answer: C. A decoy system set up to attract and trap attackers

Explanation: A honeypot is a decoy system designed to attract and trap attackers, allowing administrators to study attack techniques and protect actual systems.

Question 22

 Which of the following is used to manage digital certificates and public-key encryption?

A. Data Loss Prevention (DLP)
B. Public Key Infrastructure (PKI)
C. SIEM
D. Firewall

Correct Answer: B. Public Key Infrastructure (PKI)

Explanation: PKI manages digital certificates and public-key encryption to secure communications. DLP, SIEM, and firewalls serve different security roles.

Question 23

Which of the following is a security feature that restricts devices by their hardware MAC addresses?

A. MAC filtering
B. SSL
C. IDS
D. SIEM

Correct Answer: A. MAC filtering

Explanation: MAC filtering restricts network access based on a device's MAC address, providing a layer of security at the network level.

Question 24

What is the purpose of patch management in an organization?

A. To prevent data leaks
B. To monitor network traffic
C. To ensure systems are updated with the latest security fixes
D. To back up critical data

Correct Answer: C. To ensure systems are updated with the latest security fixes

Explanation: Patch management ensures systems are updated with the latest security patches to protect against vulnerabilities.

Question 25

Which of the following protects against unauthorized access to wireless networks by using a preshared key?

A. WEP
B. WPA2-PSK
C. MAC filtering
D. SSL

Correct Answer: B. WPA2-PSK

Explanation: WPA2-PSK protects wireless networks by using a preshared key for authentication and encryption.

Question 26

Which of the following protocols is used to encrypt email communications?

A. FTP
B. HTTP
C. IMAP
D. S/MIME

Correct Answer: D. S/MIME

Explanation: S/MIME is a protocol used to encrypt and sign email communications, providing confidentiality and integrity.

Question 27

Which of the following is used to manage user permissions and access rights in an enterprise environment?

A. Role-based access control (RBAC)
B. IDS
C. SIEM
D. Firewall

Correct Answer: A. Role-based access control (RBAC)

Explanation: RBAC manages user permissions and access rights based on their roles within an organization.

Question 28

Which of the following is designed to disrupt the availability of a network or system by overwhelming it with traffic?

A. Phishing attack
B. SQL injection
C. Denial of Service (DoS) attack
D. Man-in-the-middle attack

Correct Answer: C. Denial of Service (DoS) attack

Explanation: A DoS attack overwhelms a network or system with traffic, disrupting its availability.

Question 29

 Which of the following describes the use of encryption to protect data stored on a device?

A. Data at rest encryption
B. Data in motion encryption
C. Data tokenization
D. Data hashing

Correct Answer: A. Data at rest encryption

Explanation: Data at rest encryption protects stored data using encryption, ensuring its confidentiality even if the device is compromised.

Question 30

Which of the following types of malware disguises itself as legitimate software to gain access to systems?

A. Worm
B. Trojan
C. Spyware
D. Ransomware

Correct Answer: B. Trojan

Explanation: A trojan disguises itself as legitimate software to trick users into installing it, allowing attackers to gain access to the system.

Question 31

What is the primary purpose of a firewall in a network?

A. To prevent unauthorized access to a network
B. To scan for malware
C. To monitor employee activities
D. To back up data

Correct Answer: A. To prevent unauthorized access to a network

Explanation: Firewalls are designed to prevent unauthorized access to or from a private network by controlling incoming and outgoing network traffic based on security rules.

Question 32

Which of the following protocols provides secure remote command-line access to a device?

A. FTP
B. SSH
C. Telnet
D. SMTP

Correct Answer: B. SSH

Explanation: SSH (Secure Shell) provides secure remote command-line access and data transfer over unsecured networks, using encryption.

Question 33

Which security measure helps protect a system by isolating it from other network devices?

A. Encryption
B. Network segmentation
C. Antivirus
D. Backup

Correct Answer: B. Network segmentation

Explanation: Network segmentation involves dividing a network into smaller parts to isolate systems, improving security by limiting access and reducing the attack surface.

Question 34

Which of the following protects data during transmission by encrypting it?

A. IDS
B. VPN
C. DLP
D. SIEM

Correct Answer: B. VPN

Explanation: A VPN (Virtual Private Network) encrypts data during transmission to secure communication over public networks.

Question 35

 Which type of malware can self-replicate without requiring user interaction?

A. Trojan
B. Worm
C. Spyware
D. Adware

Correct Answer: B. Worm

Explanation: Worms are a type of malware that can self-replicate and spread across networks without requiring user interaction, unlike trojans or spyware.

Question 36

What is the purpose of an Intrusion Detection System (IDS)?

A. To prevent unauthorized access
B. To monitor network traffic for suspicious activity
C. To encrypt data in transit
D. To block malicious IP addresses

Correct Answer: B. To monitor network traffic for suspicious activity

Explanation: An IDS monitors network traffic for suspicious activity and potential threats, alerting administrators to take action.

Question 37

Which of the following refers to the use of encryption keys that are valid for only one session?

A. Symmetric encryption
B. Public-key encryption
C. Ephemeral key
D. Hashing

Correct Answer: C. Ephemeral key

Explanation: Ephemeral keys are encryption keys that are used only for a single session and then discarded, providing forward secrecy.

Question 38

Which of the following ensures data is accessible only by authorized users?

A. Integrity
B. Confidentiality
C. Availability
D. Non-repudiation

Correct Answer: B. Confidentiality

Explanation: Confidentiality ensures that sensitive data is accessed only by authorized users, protecting it from unauthorized disclosure.

Question 39

Which type of malware collects personal information from a user’s device without their knowledge?

A. Ransomware
B. Spyware
C. Worm
D. Trojan

Correct Answer: B. Spyware

Explanation: Spyware secretly collects personal information, such as browsing habits or login credentials, and transmits it to third parties without the user's knowledge.

Question 40

 Which of the following is a best practice for securing wireless networks?

A. Using WEP encryption
B. Disabling MAC filtering
C. Using WPA2 encryption
D. Enabling SSID broadcasting

Correct Answer: C. Using WPA2 encryption

Explanation: WPA2 provides stronger security for wireless networks compared to older protocols like WEP. It uses AES encryption to protect data.

Complete the Captcha to view next question set.

Prev Post
WGU D329 Practice Exam Questions – Set 5 – Part 1
Next Post
WGU D329 Practice Exam Questions – Set 5 – Part 3