OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • December 4, 2024

Question 01

What type of attack attempts to use all possible combinations of letters, numbers, and symbols to guess a password?

A. Dictionary attack
B. Password spraying
C. Brute-force attack
D. Phishing

Correct Answer: C. Brute-force attack

Explanation: A brute-force attack tries all possible combinations of passwords until it finds the correct one. Other attack types use different methods to access systems.

Question 02

Which of the following ensures that only authorized users can access sensitive information?

A. Confidentiality
B. Integrity
C. Availability
D. Non-repudiation

Correct Answer: A. Confidentiality

Explanation: Confidentiality ensures that sensitive data is only accessible to authorized users. It is one of the main principles of information security, alongside integrity and availability.

Question 03

Which security protocol uses port 443 to encrypt web traffic?

A. FTP
B. HTTPS
C. SMTP
D. DNS

Correct Answer: B. HTTPS

Explanation: HTTPS uses port 443 to secure web traffic through encryption, providing confidentiality and integrity over the internet. HTTP, FTP, and SMTP use different ports and functions

Question 04

 Which of the following prevents users from installing unauthorized software on their devices?

A. Blacklisting
B. Application whitelisting
C. Sandboxing
D. Anti-virus

Correct Answer: B. Application whitelisting

Explanation: Application whitelisting restricts users to a pre-approved list of applications, preventing unauthorized software from being installed. Blacklisting, sandboxing, and anti-virus serve different purposes.

Question 05

Which of the following is designed to identify and remove malicious software from an infected system?

A. Anti-virus
B. IDS
C. VPN
D. Firewall

Correct Answer: A. Anti-virus

Explanation: Anti-virus software detects, quarantines, and removes malicious software from a system. It scans files and processes to protect against malware like viruses, trojans, and worms.

Question 06

 What type of attack involves capturing data packets and using them to gain unauthorized access to a network?

A. Spoofing
B. Phishing
C. Replay attack
D. SQL injection

Correct Answer: C. Replay attack

Explanation: A replay attack involves capturing data packets and re-sending them to gain unauthorized access to a network. Spoofing, phishing, and man-in-the-middle attacks involve different tactics.

Question 07

Which of the following ensures that a system or service is available for use when needed?

A. Integrity
B. Confidentiality
C. Non-repudiation
D. Availability

Correct Answer: D. Availability

Explanation: Availability ensures that systems and data are accessible when required, often by implementing redundancy and fault tolerance measures. Integrity, confidentiality, and non-repudiation serve different purposes.

Question 08

Which of the following refers to an attack where the attacker manipulates legitimate DNS queries to redirect traffic to a malicious site?

A. SQL injection
B. DNS poisoning
C. Packet sniffing
D. Man-in-the-middle attack

Correct Answer: B. DNS poisoning

Explanation: DNS poisoning manipulates DNS queries to redirect users to malicious websites by corrupting DNS records. SQL injection, packet sniffing, and man-in-the-middle attacks are unrelated.

Question 09

Which of the following best describes two-factor authentication?

A. Authentication that uses a password and PIN
B. Authentication that uses a password and username
C. Authentication that uses biometric factors only
D. Authentication that uses two different methods, such as a password and a smart card

Correct Answer: D. Authentication that uses two different methods, such as a password and a smart card

Explanation: Two-factor authentication enhances security by requiring two different types of credentials, such as a password and a smart card. Using a password and PIN, or username and password, involves only one factor.

Question 10

Which of the following encrypts files on a system and demands payment to decrypt them?

A. Spyware
B. Ransomware
C. Trojan
D. Worm

Correct Answer: B. Ransomware

Explanation: Ransomware encrypts files on a victim's system and demands a ransom for decryption. Spyware, trojans, and worms have different functionalities.

Question 11

What is the purpose of hashing in information security?

A. To encrypt data
B. To control access to data
C. To verify data integrity
D. To provide non-repudiation

Correct Answer: C. To verify data integrity

Explanation: Hashing verifies data integrity by producing a fixed-length hash value from input data. It is used to ensure that data has not been altered during transmission or storage.

Question 12

Which of the following attacks involves exploiting software vulnerabilities to execute arbitrary code?

A. Buffer overflow
B. Phishing
C. SQL injection
D. Spoofing

Correct Answer: A. Buffer overflow

Explanation: A buffer overflow occurs when an attacker exploits a software vulnerability to execute arbitrary code, often leading to system crashes or unauthorized access.

Question 13

Which of the following is a technique used to manipulate search engine results to drive traffic to malicious sites?

A. Phishing
B. Spoofing
C. SQL injection
D. SEO poisoning

Correct Answer: D. SEO poisoning

Explanation: SEO poisoning manipulates search engine results to drive traffic to malicious sites. Phishing, spoofing, and SQL injection have different attack mechanisms.

Question 14

Which of the following is the MOST effective method to prevent unauthorized access to sensitive data on a mobile device?

A. Full disk encryption
B. Password protection
C. Screen lock
D. VPN

Correct Answer: A. Full disk encryption

Explanation: Full disk encryption protects sensitive data on a mobile device by encrypting all data stored on the device. Passwords, screen locks, and VPNs provide different levels of security.

Question 15

Which of the following controls access to network resources by verifying the user’s credentials?

A. Encryption
B. Authentication
C. Authorization
D. Logging

Correct Answer: B. Authentication

Explanation: Authentication verifies a user's credentials to control access to network resources. Authorization, encryption, and logging have different security functions.

Question 16

Which of the following allows a user to establish a secure connection to a remote network over the internet?

A. Firewall
B. VPN
C. Proxy
D. MAC filtering

Correct Answer: B. VPN

Explanation: A VPN allows users to establish a secure, encrypted connection to a remote network over the internet. Firewalls, proxies, and MAC filtering serve different network security purposes.

Question 17

Which of the following is a weakness or flaw that can be exploited by an attacker?

A. Vulnerability
B. Threat
C. Risk
D. Exploit

Correct Answer: A. Vulnerability

Explanation: A vulnerability is a weakness in a system that can be exploited by an attacker. It differs from threats, risks, and exploits, which are components of an attack scenario.

Question 18

Which of the following uses a public and private key pair to encrypt and decrypt data?

A. Symmetric encryption
B. Hashing
C. Asymmetric encryption
D. Salting

Correct Answer: C. Asymmetric encryption

Explanation: Asymmetric encryption uses a public and private key pair for encryption and decryption. Symmetric encryption, hashing, and salting use different methods.

Question 19

What type of attack takes advantage of software flaws to install malware on a victim’s machine without their knowledge?

A. Phishing
B. Denial of Service (DoS)
C. Drive-by download
D. Spoofing

Correct Answer: C. Drive-by download

Explanation: A drive-by download occurs when malicious code is automatically downloaded to a user's system by exploiting vulnerabilities in software. Phishing, DoS, and spoofing attacks work differently.

Question 20

Which of the following tools is used to capture and analyze network traffic?

A. Firewall
B. Protocol analyzer
C. Proxy
D. VPN

Correct Answer: B. Protocol analyzer

Explanation: A protocol analyzer captures and analyzes network traffic to identify potential security issues. Firewalls, proxies, and VPNs serve different security functions.

Complete the Captcha to view next question set.

Prev Post
WGU D325 Practice Exam Questions – Set 5 – Part 1
Next Post
WGU D329 Practice Exam Questions – Set 5 – Part 2