OA Exams

  • web.groovymark@gmail.com
  • November 28, 2024

Question 01

 What is the primary function of a firewall in network security?

a) To speed up internet connections
b) To monitor network performance
c) To block unauthorized access
d) To store backups

Correct Answer: c) To block unauthorized access

Explanation: A firewall is a combination of hardware and software designed to prevent unauthorized access to or from a private network.

Question 02

Which of the following best defines malware?

a) Software designed to update a computer
b) Software that helps the computer run faster
c) Software specifically designed to damage or disrupt a computer system
d) Software used to manage passwords

Correct Answer: c) Software specifically designed to damage or disrupt a computer system

Explanation: Malware is any software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

Question 03

What does a Trojan horse malware typically do?

a) Encrypt files on a computer
b) Allow hackers to control a computer remotely
c) Send spam emails
d) Seem harmless at first but execute malicious activities when run

Correct Answer: d) Seem harmless at first but execute malicious activities when run

Explanation: A Trojan horse appears to be a legitimate program, but it carries out harmful activities once executed.

Question 04

Which of the following is an example of phishing?

a) An email that claims to be from a bank asking for personal information
b) A popup ad promoting antivirus software
c) A text message from your phone service provider
d) An automatic software update

Correct Answer: a) An email that claims to be from a bank asking for personal information

Explanation: Phishing is an attempt to obtain sensitive information by pretending to be a legitimate entity, often through email.

Question 05

What is the role of a proxy server?

a) To store files
b) To enhance video streaming quality
c) To act as an intermediary between a client and the internet
d) To prevent phishing attempts

Correct Answer: c) To act as an intermediary between a client and the internet

Explanation: A proxy server serves as an intermediary for requests from clients seeking resources from other servers, providing anonymity or filtering services.

Question 06

What is a key benefit of using a VPN (Virtual Private Network)?

a) Increased browsing speed
b) Access to restricted content
c) Enhanced data compression
d) Increased battery life

Correct Answer: b) Access to restricted content

Explanation: A VPN allows users to access content that may be restricted in their geographical location by creating a secure connection to a different network.

Question 07

What does the term ‘Denial-of-Service (DoS) attack’ refer to?

a) An attack that steals user credentials
b) An attack that encrypts files
c) An attack that attempts to overwhelm a system, rendering it unavailable
d) An attack that installs malicious software

Correct Answer: c) An attack that attempts to overwhelm a system, rendering it unavailable

Explanation: A DoS attack floods a server or network with requests, overwhelming it and making it unavailable to legitimate users.

Question 08

Which of the following is a typical sign of ransomware infection?

a) The computer runs slower than usual
b) A pop-up message demanding payment to unlock files
c) Files get deleted automatically
d) A system error report from the OS

Correct Answer: b) A pop-up message demanding payment to unlock files

Explanation: Ransomware typically encrypts the user's files and then demands a ransom to decrypt them.

Question 09

Which term refers to software that tracks user activities without their consent?

a) Adware
b) Spyware
c) Malware
d) Ransomware

Correct Answer: b) Spyware

 

Explanation: Spyware is software that gathers user information without consent, often for advertising or data theft purposes.

Question 10

 What is the function of a CAPTCHA in online security?

a) To verify a user’s identity
b) To prevent automated bots from submitting forms
c) To increase encryption
d) To enhance password security

Correct Answer: b) To prevent automated bots from submitting forms

Explanation: CAPTCHA is used to differentiate between human users and bots, preventing automated scripts from abusing web services.

Question 11

Which network topology connects all devices in a loop?

a) Star topology
b) Ring topology
c) Bus topology
d) Mesh topology

Correct Answer: b) Ring topology

Explanation: In a ring topology, each device is connected to two other devices, forming a loop.

Question 12

What is a key difference between a LAN and a WAN?

a) A LAN is for wireless networks, and a WAN is for wired networks
b) A LAN covers a small area, while a WAN covers a large geographical area
c) A LAN is slower than a WAN
d) A WAN is restricted to a single building

Correct Answer: b) A LAN covers a small area, while a WAN covers a large geographical area

Explanation: A Local Area Network (LAN) covers a small geographic area, such as a building, while a Wide Area Network (WAN) spans large geographical areas.

Question 13

What does the term ‘default-deny firewall rule’ mean?

a) All traffic is allowed unless specifically denied
b) No traffic is allowed unless explicitly permitted
c) All incoming traffic is allowed but outgoing traffic is blocked
d) All outgoing traffic is allowed but incoming traffic is blocked

Correct Answer: b) No traffic is allowed unless explicitly permitted

Explanation: In a default-deny rule, the firewall blocks all traffic unless it is explicitly allowed by rules.

Question 14

What is the primary role of a Network Administrator?

a) Designing network hardware
b) Ensuring smooth network operations and security
c) Writing software applications
d) Creating backup systems

Correct Answer: b) Ensuring smooth network operations and security

Explanation: A network administrator manages and maintains the network, ensuring it functions properly and securely.

Question 15

 Which of the following best defines a ‘peer-to-peer’ (P2P) network?


a) A network with a central server managing traffic
b) A network where devices connect directly to each other without a central server
c) A network with encrypted data
d) A network for wireless connections only

Correct Answer: b) A network where devices connect directly to each other without a central server

Explanation: In a peer-to-peer network, devices communicate directly with each other without needing a central server.

Question 16

Which protocol is responsible for translating domain names into IP addresses?

a) TCP/IP
b) HTTP
c) DNS
d) HTTPS

Correct Answer: c) DNS

Explanation: The Domain Name System (DNS) translates human-readable domain names into IP addresses used for routing requests over the internet.

Question 17

What is the purpose of data encryption?

a) To speed up data transmission
b) To compress files for storage
c) To protect data from unauthorized access
d) To increase storage space

Correct Answer: c) To protect data from unauthorized access

Explanation: Data encryption converts data into a code to prevent unauthorized access to the information.

Question 18

Which of the following is an example of an internal security threat?

a) A phishing attack
b) A disgruntled employee stealing company data
c) A ransomware attack
d) A denial-of-service attack

Correct Answer: b) A disgruntled employee stealing company data

Explanation: Internal threats come from within the organization, often involving employees who misuse their access to sensitive data.

Question 19

What is a MAC address used for in networking?

a) Encrypting network traffic
b) Identifying devices on a network
c) Managing network connections
d) Speeding up data transmission

Correct Answer: b) Identifying devices on a network

Explanation: A MAC (Media Access Control) address is a unique identifier assigned to network interfaces for communication on a network.

Question 20

Which type of network topology uses a central hub to connect devices?

a) Star topology
b) Ring topology
c) Bus topology
d) Mesh topology

Correct Answer: a) Star topology

Explanation: In a star topology, each device is connected to a central hub or switch, which manages the data transmission.

Complete the Captcha to view next question set.

Tags

Prev Post
WGU D075 Practice Exam Questions – Set 4 – Part 3
Next Post
WGU D075 Practice Exam Questions – Set 5 – Part 2