OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • November 28, 2024

Question 01

What is the purpose of a firewall in network security?

A) To monitor network traffic
B) To prevent unauthorized access to or from a private network
C) To back up data
D) To increase network speed0

Correct Answer: B) To prevent unauthorized access to or from a private network

Explanation: A firewall acts as a barrier between a trusted internal network and untrusted external networks, blocking unauthorized access.

Question 02

Which of the following is an example of two-factor authentication?

A) Username and password
B) Password and security questions
C) Password and one-time code sent to a phone
D) Email verification only

Correct Answer: C) Password and one-time code sent to a phone

Explanation: Two-factor authentication requires two separate methods of verification, such as a password and a one-time code sent to a user’s phone.

Question 03

Which database query language is used to retrieve and manipulate data in a relational database?

A) XML
B) SQL
C) HTML
D) JSON

Correct Answer: B) SQL

Explanation: SQL (Structured Query Language) is the standard language used for managing and manipulating data in relational databases.

Question 04

Which cloud service model provides software applications over the internet without the need to install them locally?

A) SaaS
B) PaaS
C) IaaS
D) DaaS

Correct Answer: A) SaaS

Explanation: Software as a Service (SaaS) delivers software applications over the internet, removing the need for local installation or maintenance.

Question 05

What is a common characteristic of open-source software?

A) It is free but cannot be modified
B) It is proprietary and licensed
C) It allows users to modify and distribute the source code
D) It only runs on specific hardware

Correct Answer: C) It allows users to modify and distribute the source code

Explanation: Open-source software is freely available to users and can be modified and redistributed under specific licensing terms.

Question 06

Which type of backup copies only the files that have changed since the last full backup?

A) Full backup
B) Incremental backup
C) Differential backup
D) Partial backup

Correct Answer: B) Incremental backup

Explanation: An incremental backup only backs up files that have changed since the last backup, making it more efficient than a full backup.

Question 07

What does the acronym IoT stand for in technology?

A) Internet of Things
B) Internet of Technology
C) Interface of Tools
D) Integration of Technology

Correct Answer: A) Internet of Things

Explanation: IoT (Internet of Things) refers to a network of connected devices, sensors, and objects that communicate and exchange data over the internet.

Question 08

 Which type of network topology connects devices in a circular configuration, passing data in one direction?

A) Star topology
B) Bus topology
C) Ring topology
D) Mesh topology

Correct Answer: C) Ring topology

Explanation: In a ring topology, devices are connected in a circular arrangement, and data travels in one direction around the ring.

Question 09

Which security method uses encryption to convert data into an unreadable format for transmission over a network?

A) Tokenization
B) Firewalls
C) VPN
D) Encryption

Correct Answer: D) Encryption

Explanation: Encryption secures data by converting it into an unreadable format, protecting it during transmission over a network.

Question 10

Which type of cloud computing offers the ability to develop, run, and manage applications without managing the underlying infrastructure?

A) SaaS
B) PaaS
C) IaaS
D) DaaS

Correct Answer: B) PaaS

Explanation: Platform as a Service (PaaS) provides a platform that allows developers to create, run, and manage applications without dealing with the infrastructure.

Question 11

What is the primary function of RAM in a computer system?

A) To store data permanently
B) To store data temporarily for quick access
C) To perform calculations
D) To connect to a network

Correct Answer: B) To store data temporarily for quick access

Explanation: RAM (Random Access Memory) temporarily stores data for quick access while the computer is running, improving system performance.

Question 12

 Which of the following is an example of a database management system (DBMS)?

A) Microsoft Word
B) Oracle
C) Adobe Photoshop
D) Python

Correct Answer: B) Oracle

Explanation: Oracle is a database management system (DBMS) used for storing, retrieving, and managing data in a structured way.

Question 13

Which process in computing ensures that only authorized users have access to certain data?

A) Authentication
B) Encryption
C) Backup
D) Validation

Correct Answer: A) Authentication

Explanation: Authentication is the process of verifying the identity of a user to ensure that only authorized individuals can access certain data or systems.

Question 14

What is the purpose of a content delivery network (CDN)?

A) To secure network traffic
B) To improve website loading times by caching content
C) To monitor user activity
D) To restrict access to certain websites

Correct Answer: B) To improve website loading times by caching content

Explanation: A CDN stores cached copies of website content in multiple geographic locations, reducing latency and improving website loading speeds.

Question 15

Which of the following best describes the purpose of SQL injection attacks?

A) To overload a system with excessive traffic
B) To inject malicious code into a web application’s database
C) To steal data during transmission
D) To disrupt a network by flooding it with traffic

Correct Answer: B) To inject malicious code into a web application’s database

Explanation: SQL injection attacks involve inserting malicious SQL code into input fields to manipulate or access the database illegally.

Question 16

What is the primary function of the CPU in a computer system?

A) To store data
B) To process instructions and perform calculations
C) To manage network connections
D) To provide security for the system

Correct Answer: B) To process instructions and perform calculations

Explanation: The CPU (Central Processing Unit) is responsible for executing instructions and performing calculations, acting as the brain of the computer.

Question 17

Which term refers to a unique number assigned to devices on a network for identification and communication?

A) IP address
B) MAC address
C) DNS
D) Subnet

Correct Answer: A) IP address

Explanation: An IP address is a unique number assigned to devices on a network that allows them to communicate and be identified.

Question 18

What is the main purpose of two-factor authentication (2FA)?

A) To encrypt data during transmission
B) To increase the difficulty of unauthorized access
C) To backup data
D) To optimize network speed

Correct Answer: B) To increase the difficulty of unauthorized access

Explanation: Two-factor authentication (2FA) enhances security by requiring two forms of verification, making it harder for unauthorized users to gain access.

Question 19

Which of the following is a characteristic of a relational database?

A) Data is stored in a flat file
B) Data is organized into rows and columns
C) Data is stored in unstructured formats
D) Data is encrypted by default

Correct Answer: B) Data is organized into rows and columns

Explanation: A relational database organizes data into tables with rows and columns, enabling efficient querying and management.

Question 20

What does the acronym RAID stand for in data storage?

A) Redundant Array of Independent Disks
B) Random Access of Independent Data
C) Reliable Access for Independent Devices
D) Redundant Access of Internal Devices

Correct Answer: A) Redundant Array of Independent Disks

Explanation: RAID (Redundant Array of Independent Disks) is a data storage technology that combines multiple disks to improve performance and provide redundancy.

Complete the Captcha to view next question set.

Prev Post
WGU D322 Practice Exam Questions – Set 4 – Part 3
Next Post
WGU D322 Practice Exam Questions – Set 5 – Part 2