OA Exams

  • web.groovymark@gmail.com
  • December 6, 2024

Question 41

Which security practice involves regularly updating software to protect against known vulnerabilities?

A) Patching
B) Data encryption
C) Data masking
D) Data backup

Correct Answer: A) Patching

Explanation: Patching involves applying updates to software to protect against known vulnerabilities and ensure that systems remain secure.

Question 42

What is the primary function of an ETL process in data management?

A) Encrypting sensitive data
B) Extracting, transforming, and loading data into a database
C) Backing up data for disaster recovery
D) Deleting outdated or irrelevant data

Correct Answer: B) Extracting, transforming, and loading data into a database

Explanation: The ETL process involves extracting data from source systems, transforming it for analysis, and loading it into a target database.

Question 43

Which of the following describes an interpreted language?

A) The entire program is translated before execution
B) Each line of code is translated and executed one at a time
C) It runs faster than compiled languages
D) It does not require a runtime environment

Correct Answer: B) Each line of code is translated and executed one at a time

Explanation: Interpreted languages translate and execute code one line at a time, making them flexible but often slower than compiled languages.

Question 44

Which of the following is considered a vulnerability in network security?

A) Strong encryption
B) Open ports
C) Two-factor authentication
D) Encrypted backups

Correct Answer: B) Open ports

Explanation: Open ports can be a vulnerability in network security as they can be exploited by attackers to gain unauthorized access to a system.

Question 45

Which type of database model organizes data in tables with rows and columns, where each record is uniquely identified by a key?

A) Flat file
B) Relational
C) Hierarchical
D) Object-oriented

Correct Answer: B) Relational

Explanation: A relational database model organizes data into tables with rows and columns, and each record is uniquely identified by a primary key.

Question 46

What does the acronym FTP stand for in networking?

A) File Transmission Protocol
B) File Transfer Protocol
C) Fast Transfer Process
D) File Traffic Processing

Correct Answer: B) File Transfer Protocol

Explanation: FTP (File Transfer Protocol) is used to transfer files between computers over a network, enabling the exchange of data.

Question 47

 Which type of attack involves injecting malicious code into an application through user input fields, often targeting databases?

A) Denial-of-service attack
B) SQL injection
C) Phishing attack
D) Buffer overflow

Correct Answer: B) SQL injection

Explanation: SQL injection is an attack where malicious SQL code is inserted into an application’s input fields, targeting the database for unauthorized actions.

Question 48

Which data type refers to numbers that can contain decimals?

A) Integer
B) Boolean
C) String
D) Floating-poin

Correct Answer: D) Floating-point

Explanation: Floating-point data types are used to represent numbers that can contain decimals, such as 3.14 or 0.001.

Question 49

What is the main purpose of a database management system (DBMS)?

A) To store large datasets across multiple systems
B) To provide a framework for creating applications
C) To manage and control access to databases
D) To compile programs into machine code

Correct Answer: C) To manage and control access to databases

Explanation: A database management system (DBMS) manages and controls access to databases, ensuring data is stored, retrieved, and updated efficiently.

Question 50

Which cybersecurity attack involves eavesdropping on a network to capture unencrypted data in transit?

A) Phishing attack
B) Packet sniffing
C) SQL injection
D) Man-in-the-middle attack

Correct Answer: B) Packet sniffing

Explanation: Packet sniffing is a type of cybersecurity attack where unencrypted data being transmitted over a network is intercepted by an attacker.

Complete the Captcha to view next question set.

Prev Post
WGU D332 Practice Exam Questions – Set 4 – Part 2
Next Post
WGU D332 Practice Exam Questions – Set 5 – Part 1