OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • November 28, 2024

Question 21

What is the primary function of a router in a network?

a) To store data
b) To direct traffic between different networks
c) To block unauthorized users
d) To provide wireless connectivity

Correct Answer: b) To direct traffic between different networks

Explanation: A router is responsible for directing data between different networks, ensuring that data reaches its correct destination.

Question 22

What is the function of a network switch?

a) To block unauthorized access
b) To manage data traffic within a local network
c) To provide internet access
d) To increase connection speed

Correct Answer: b) To manage data traffic within a local network

Explanation: A network switch manages data traffic within a local network by sending data packets to the correct device.

Question 23

Which type of malware spreads through network connections without user intervention?

a) Virus
b) Worm
c) Trojan horse
d) Adware

Correct Answer: b) Worm

Explanation: A worm is a type of malware that can spread across networks without any user intervention.

Question 24

What does the term ‘default-allow firewall rule’ mean?

a) No traffic is allowed unless explicitly permitted
b) All traffic is allowed unless specifically blocked
c) Only outgoing traffic is allowed
d) All traffic is blocked unless outgoing

Correct Answer: b) All traffic is allowed unless specifically blocked

Explanation: In a default-allow rule, all traffic is allowed by the firewall unless there is a specific rule to block it.

Question 25

What does a Virtual Private Network (VPN) do?

a) Protects your computer from malware
b) Encrypts internet traffic and hides your IP address
c) Increases your browsing speed
d) Disables firewalls on public networks

Correct Answer: b) Encrypts internet traffic and hides your IP address

Explanation: A VPN encrypts data and routes it through a secure server, hiding your IP address and ensuring secure browsing.

Question 26

Which of the following is an example of a DoS (Denial-of-Service) attack?

a) Sending multiple phishing emails
b) Flooding a website with too much traffic, making it unavailable
c) Infiltrating a network to steal data
d) Decrypting user passwords

Correct Answer: b) Flooding a website with too much traffic, making it unavailable

Explanation: A DoS attack overwhelms a server with traffic, making it unavailable for legitimate users.

Question 27

What does the term ‘social engineering’ refer to in cybersecurity?

a) Building strong firewalls
b) Manipulating people into divulging confidential information
c) Encrypting files for security
d) Using software to protect data

Correct Answer: b) Manipulating people into divulging confidential information

Explanation: Social engineering involves tricking people into providing sensitive information, such as passwords, rather than hacking a system.

Question 28

What is the main goal of a phishing attack?

a) To steal sensitive information
b) To slow down the network
c) To spread malware
d) To disable antivirus software

Correct Answer: a) To steal sensitive information

Explanation: Phishing attacks are designed to trick users into providing sensitive information like usernames, passwords, or credit card details.

Question 29

Which device assigns IP addresses to devices on a network?

a) Switch
b) Router
c) DHCP server
d) Firewall

Correct Answer: c) DHCP server

Explanation: A DHCP server dynamically assigns IP addresses to devices on a network, ensuring they have unique identifiers.

Question 30

Which technology allows multiple virtual machines to run on a single physical machine?

a) Cloud computing
b) Virtualization
c) Firewall
d) Load balancing

Correct Answer: b) Virtualization

Explanation: Virtualization allows a single physical machine to run multiple virtual machines, each operating as if it were a separate physical machine.

Question 31

What does a database administrator (DBA) do?

a) Manages and maintains an organization’s databases
b) Writes code for new software applications
c) Designs network infrastructure
d) Installs operating systems

Correct Answer: a) Manages and maintains an organization's databases

Explanation: A database administrator (DBA) is responsible for ensuring the performance, security, and integrity of databases in an organization.

Question 32

What is the main function of a firewall in network security?

a) To prevent malware infections
b) To block unauthorized access to a network
c) To manage network speeds
d) To provide wireless internet

Correct Answer: b) To block unauthorized access to a network

Explanation: A firewall monitors and controls incoming and outgoing network traffic based on predetermined security rules, blocking unauthorized access.

Question 33

Which of the following is considered a physical security measure?

a) Encryption
b) Firewall
c) Biometric access control
d) VPN

Correct Answer: c) Biometric access control

Explanation: Physical security measures like biometric access control prevent unauthorized individuals from physically accessing secure locations.

Question 34

What does SSL (Secure Sockets Layer) encryption protect?

a) Hard drive data
b) Email accounts
c) Data transmitted over the internet
d) Password storage

Correct Answer: c) Data transmitted over the internet

Explanation: SSL encryption ensures that data transmitted over the internet is secure and protected from interception.

Question 35

What is the role of a proxy server?

a) To provide extra storage
b) To serve as an intermediary between a client and the internet
c) To block malware
d) To enhance network speeds

Correct Answer: b) To serve as an intermediary between a client and the internet

Explanation: A proxy server acts as an intermediary between a user's computer and the internet, providing anonymity or filtering content.

Question 36

Which technology allows secure communication over the internet by using encryption?

a) VPN
b) Firewall
c) HTTP
d) DNS

Correct Answer: a) VPN

Explanation: A VPN (Virtual Private Network) encrypts internet traffic, ensuring secure communication over the internet.

Question 37

 What is the main purpose of a phishing attack?

a) To trick users into providing personal information
b) To spread malware across a network
c) To disable firewalls
d) To install antivirus software

Correct Answer: a) To trick users into providing personal information

Explanation: Phishing attacks are designed to steal personal information by tricking individuals into providing their login credentials or financial data.

Question 38

Which of the following is an example of an internal threat to an organization?

a) A DDoS attack
b) An employee stealing confidential data
c) A phishing email
d) Malware infection from an external source

Correct Answer: b) An employee stealing confidential data

Explanation: Internal threats come from within the organization, often involving employees who misuse their access to confidential information.

Question 39

What does a network switch do in a local network?

a) Manages data traffic between devices on the same network
b) Assigns IP addresses to devices
c) Blocks malware from entering the network
d) Provides wireless access to devices

Correct Answer: a) Manages data traffic between devices on the same network

Explanation: A switch is responsible for managing and directing data traffic between devices in a local network.

Question 40

What is the purpose of DNS (Domain Name System)?

a) To assign IP addresses to devices
b) To encrypt data
c) To translate domain names into IP addresses
d) To manage network connections

Correct Answer: c) To translate domain names into IP addresses

Explanation: DNS is used to translate human-readable domain names into IP addresses that computers use to communicate with each other.

Complete the Captcha to view next question set.

Tags

Prev Post
WGU D075 Practice Exam Questions – Set 5 – Part 1
Next Post
WGU D075 Practice Exam Questions – Set 5 – Part 3