OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • December 6, 2024

Question 01

What is the purpose of a firewall in network security?

A) To increase network bandwidth
B) To block unauthorized access while allowing legitimate communication
C) To store and manage encryption keys
D) To monitor and log data traffic only

Correct Answer: B) To block unauthorized access while allowing legitimate communication

Explanation: A firewall is a security device that monitors and filters incoming and outgoing network traffic to block unauthorized access while permitting legitimate communication.

Question 02

Which of the following storage types is volatile and loses data when the power is turned off?

A) ROM
B) RAM
C) Flash Memory
D) Hard Drive

Correct Answer: B) RAM

Explanation: RAM (Random Access Memory) is volatile, meaning it requires power to retain data. When the power is off, all stored data is lost.

Question 03

Which protocol is used to securely transfer files over a network?

A) FTP
B) HTTP
C) SSH
D) SFTP

Correct Answer: D) SFTP

Explanation: SFTP (Secure File Transfer Protocol) is used to securely transfer files over a network by encrypting the file data during transmission.

Question 04

Which risk management strategy shifts the responsibility of handling a risk to a third party?

A) Risk Acceptance
B) Risk Mitigation
C) Risk Avoidance
D) Risk Transference

Correct Answer: D) Risk Transference

Explanation: Risk transference involves shifting the responsibility for managing the risk to a third party, such as through insurance or outsourcing.

Question 05

What does the term “Big Data” refer to?

A) The process of analyzing small datasets
B) Datasets that are too large and complex to be processed by traditional methods
C) A type of database architecture
D) A network protocol for data transmission

Correct Answer: B) Datasets that are too large and complex to be processed by traditional methods

Explanation: Big Data refers to datasets so large and complex that they require advanced tools and methods for processing and analysis.

Question 06

Which network model allows a user to access both internal resources and external resources provided by third parties?

A) Internet
B) Intranet
C) Extranet
D) VPN

Correct Answer: C) Extranet

Explanation: An extranet is a network that allows authorized external users to access certain internal resources of an organization, while still maintaining security.

Question 07

Which of the following programming languages is commonly used for web development and is considered an interpreted language?

A) C++
B) Java
C) Python
D) JavaScript

Correct Answer: D) JavaScript

Explanation: JavaScript is an interpreted language that is widely used for web development to make interactive and dynamic web pages.

Question 08

Which database operation allows the combination of data from two or more tables?

A) Selection
B) Projection
C) Join
D) Union

Correct Answer: C) Join

Explanation: A join operation in a database combines rows from two or more tables based on a related column between them.

Question 09

What is the main purpose of an operating system?

A) To store files permanently
B) To manage computer hardware and software resources
C) To design graphical interfaces
D) To compile programs

Correct Answer: B) To manage computer hardware and software resources

Explanation: The primary purpose of an operating system is to manage hardware, software resources, and provide common services for computer programs.

Question 10

Which cloud service model provides users with access to software applications over the internet?

A) IaaS
B) PaaS
C) DaaS
D) SaaS

Correct Answer: D) SaaS

Explanation: Software as a Service (SaaS) delivers software applications over the internet, allowing users to access and use them without managing the underlying infrastructure.

Question 11

Which technique allows data to be stored across multiple disks for redundancy and performance improvement?

A) Compression
B) Virtualization
C) Encryption
D) RAID

Correct Answer: D) RAID

Explanation: RAID (Redundant Array of Independent Disks) is a technique used to store data across multiple disks for redundancy and performance improvement.

Question 12

Which type of attack involves overwhelming a network or server with traffic to render it unusable?

A) Man-in-the-middle attack
B) SQL injection
C) Denial-of-service (DoS) attack
D) Phishing attack

Correct Answer: C) Denial-of-service (DoS) attack

Explanation: A DoS attack overwhelms a network or server with excessive traffic, making it unavailable to legitimate users.

Question 13

Which database management task involves ensuring only authorized users can access sensitive data?

A) Query optimization
B) Data backup
C) Data validation
D) Data security

Correct Answer: D) Data security

Explanation: Data security involves measures taken to protect data from unauthorized access, ensuring that only authorized users can access sensitive information.

Question 14

 Which of the following is a key component of a database used to uniquely identify a record?

A) Foreign Key
B) Primary Key
C) Index
D) Attribute

Correct Answer: B) Primary Key

Explanation: A primary key is a unique identifier for a record in a database table, ensuring that each record can be uniquely distinguished from others.

Question 15

What type of cloud computing model allows organizations to rent virtualized computing resources such as virtual servers and storage?

A) SaaS
B) IaaS
C) PaaS
D) DaaS

Correct Answer: B) IaaS

Explanation: Infrastructure as a Service (IaaS) allows organizations to rent virtualized computing resources, including virtual servers, storage, and networking over the internet.

Question 16

 Which security principle ensures that data remains available to authorized users when needed?

A) Integrity
B) Confidentiality
C) Availability
D) Authentication

Correct Answer: C) Availability

Explanation: Availability ensures that authorized users have reliable access to data and services whenever they are needed.

Question 17

What is the process of extracting, transforming, and loading data into a database for analysis?

A) Data processing
B) Data mining
C) ETL
D) Querying

Correct Answer: C) ETL

Explanation: ETL (Extract, Transform, Load) is the process of extracting data from various sources, transforming it for analysis, and loading it into a database.

Question 18

 What does IPv6 offer that IPv4 does not?

A) Faster data transmission speeds
B) More complex routing algorithms
C) Larger address space
D) Increased encryption standards

Correct Answer: C) Larger address space

Explanation: IPv6 offers a significantly larger address space than IPv4, accommodating the growing number of devices connected to the internet.

Question 19

Which security measure prevents unauthorized users from accessing confidential data?

A) Data Integrity
B) Confidentiality
C) Availability
D) Redundancy

Correct Answer: B) Confidentiality

Explanation: Confidentiality ensures that sensitive information is not disclosed to unauthorized users, protecting it from unauthorized access.

Question 20

Which of the following describes a flat-file database?

A) Contains multiple tables with relationships between them
B) Contains a single table with no relationships
C) Organizes data using a tree-like structure
D) Uses keys to link tables

Correct Answer: B) Contains a single table with no relationships

Explanation: A flat-file database consists of a single table with no relationships between data, making it simpler but less efficient than relational databases.

Complete the Captcha to view next question set.

Prev Post
WGU D332 Practice Exam Questions – Set 3 – Part 3
Next Post
WGU D332 Practice Exam Questions – Set 4 – Part 2