OA Exams

  • web.groovymark@gmail.com
  • December 4, 2024

Question 41

Which of the following protocols is used to send email from a client to a server?

A. HTTP
B. HTTPS
C. SMTP
D. FTP

Correct Answer: C. SMTP

Explanation: SMTP (Simple Mail Transfer Protocol) is used to send email from a client to a server. HTTP and HTTPS are used for web traffic, while FTP is used for file transfers.

Question 42

Which of the following is the primary purpose of a VPN?

A. To encrypt data stored on a disk
B. To provide secure communication over the internet
C. To manage user access to applications
D. To perform network penetration testing

Correct Answer: B. To provide secure communication over the internet

Explanation: VPNs encrypt data and provide secure communication over the internet. They do not manage user access or perform penetration testing.

Question 43

 What type of attack involves repeatedly trying different combinations of passwords to gain access to an account?

A. Phishing
B. Man-in-the-middle attack
C. Brute-force attack
D. Smishing

Correct Answer: C. Brute-force attack

Explanation: Brute-force attacks involve repeatedly trying different combinations of passwords to gain access to an account. Phishing, man-in-the-middle attacks, and smishing are different attack methods.

Question 44

Which of the following refers to software that collects personal information without the user’s consent?

A. Adware
B. Spyware
C. Ransomware
D. Worm

Correct Answer: B. Spyware

Explanation: Spyware collects personal information from users without their consent. Adware displays ads, ransomware locks users out, and worms spread across networks.

Question 45

What is the primary function of a proxy server?

A. To monitor network traffic
B. To filter and forward requests between clients and servers
C. To encrypt communications
D. To store security policies

Correct Answer: B. To filter and forward requests between clients and servers

Explanation: A proxy server filters and forwards requests between clients and servers, acting as an intermediary. It does not encrypt communications or store security policies.

Question 46

Which of the following describes a process where an attacker’s device impersonates another device on a network?

A. Bluesnarfing
B. Spoofing
C. Phishing
D. Smishing

Correct Answer: B. Spoofing

Explanation: Spoofing involves an attacker's device impersonating another device on a network. Bluesnarfing, phishing, and smishing involve different attack methods.

Question 47

What is the purpose of salting passwords before hashing them?

A. To encrypt the password
B. To prevent rainbow table attacks
C. To convert the password into a fixed-length string
D. To ensure confidentiality of the password

Correct Answer: B. To prevent rainbow table attacks

Explanation: Salting passwords before hashing them adds a random value to make it harder for attackers to crack the password using rainbow table attacks. It does not encrypt or ensure confidentiality.

Question 48

Which of the following refers to a distributed attack where multiple systems are used to flood a target with traffic?

A. SQL injection
B. Denial of Service (DoS)
C. Man-in-the-middle attack
D. Distributed Denial of Service (DDoS)

Correct Answer: D. Distributed Denial of Service (DDoS)

Explanation: A DDoS attack involves multiple systems flooding a target with traffic, overwhelming its resources. SQL injection, DoS, and man-in-the-middle attacks use different methods.

Question 49

Which of the following best describes the concept of least privilege?

A. Users should have only the permissions necessary to complete their tasks
B. All users should have administrator privileges
C. Only administrators should be able to access systems
D. Users should have access to all data in the network

Correct Answer: A. Users should have only the permissions necessary to complete their tasks

Explanation: Least privilege ensures that users are given only the permissions they need to complete their tasks, reducing the risk of unauthorized access. It does not grant administrator privileges to all users.

Question 50

 Which of the following refers to a security solution that prevents data from being lost, stolen, or misused?

A. Data Loss Prevention (DLP)
B. Security Information and Event Management (SIEM)
C. Public Key Infrastructure (PKI)
D. Penetration testing

Correct Answer: A. Data Loss Prevention (DLP)

Explanation: Data Loss Prevention (DLP) solutions prevent sensitive data from being lost, stolen, or misused by monitoring and enforcing data handling policies. SIEM, PKI, and penetration testing serve different security purposes.

Complete the Captcha to view next question set.

Prev Post
WGU D329 Practice Exam Questions – Set 4 – Part 2
Next Post
WGU D325 Practice Exam Questions – Set 5 – Part 1