OA Exams

  • web.groovymark@gmail.com
  • December 6, 2024

Question 21

Which programming language is primarily used for developing web applications and is known for running on both the client and server sides?

A) JavaScript
B) Python
C) C++
D) Swift

Correct Answer: A) JavaScript

Explanation: JavaScript is widely used for developing web applications and can run on both the client and server sides, providing dynamic functionality.

Question 22

Which type of network topology uses a central hub or switch to connect all devices?

A) Ring topology
B) Bus topology
C) Star topology
D) Mesh topology

Correct Answer: C) Star topology

Explanation: In a star topology, all devices are connected to a central hub or switch, which serves as the communication point for the network.

Question 23

What is the purpose of hashing in cybersecurity?

A) To encrypt data during transmission
B) To store passwords securely by converting them into fixed-length values
C) To increase network performance
D) To decrypt sensitive data

Correct Answer: B) To store passwords securely by converting them into fixed-length values

Explanation: Hashing converts data, such as passwords, into fixed-length values, making it more difficult for attackers to reverse the process and retrieve the original data.

Question 24

 Which of the following is a benefit of using virtualization in data centers?

A) Increased hardware costs
B) Enhanced data encryption
C) Efficient resource utilization
D) Reduced software updates

Correct Answer: C) Efficient resource utilization

Explanation: Virtualization enables the efficient utilization of hardware resources by allowing multiple virtual machines to run on a single physical server.

Question 25

What is the purpose of a VPN (Virtual Private Network)?

A) To block unauthorized access to a network
B) To create a secure, encrypted connection over the internet
C) To monitor network traffic
D) To improve data transmission speeds

Correct Answer: B) To create a secure, encrypted connection over the internet

Explanation: A VPN creates a secure and encrypted connection over a public network, allowing users to protect their data and privacy while browsing.

Question 26

Which database management system (DBMS) feature ensures that only authorized users can access and manipulate data?

A) Data encryption
B) Access control
C) Backup and recovery
D) Data replication

Correct Answer: B) Access control

Explanation: Access control in a DBMS ensures that only authorized users have the necessary permissions to access and manipulate data.

Question 27

 Which technology allows multiple virtual machines to run on a single physical server?

A) Load balancing
B) Clustering
C) Virtualization
D) RAID

Correct Answer: C) Virtualization

Explanation: Virtualization enables multiple virtual machines to run on a single physical server, optimizing hardware usage and allowing for flexible resource allocation.

Question 28

 What is the role of a cybersecurity specialist in an organization?

A) To develop software applications
B) To manage employee payroll
C) To monitor and protect the organization’s network from security threats
D) To optimize the organization’s website

Correct Answer: C) To monitor and protect the organization’s network from security threats

Explanation: A cybersecurity specialist monitors and protects an organization’s network from security threats, ensuring the integrity and confidentiality of data.

Question 29

What does the term “phishing” refer to in cybersecurity?

A) A method used to gain unauthorized access to a system by exploiting vulnerabilities
B) A type of cyberattack where an attacker sends fraudulent messages to trick individuals into providing sensitive information
C) A software that prevents unauthorized access to a network
D) A technique used to encrypt data

Correct Answer: B) A type of cyberattack where an attacker sends fraudulent messages to trick individuals into providing sensitive information

Explanation: Phishing is a type of cyberattack where an attacker sends deceptive messages, often posing as a trusted entity, to trick individuals into revealing sensitive information such as passwords or credit card details.

Question 30

Which data structure is used to organize data into rows and columns in a relational database?

A) Tuple
B) Table
C) Hash
D) List

Correct Answer: B) Table

Explanation: In a relational database, data is organized into tables, with rows representing records and columns representing attributes.

Question 31

What does the term “malware” refer to?

A) A program used to protect computers from unauthorized access
B) A software tool designed to detect network vulnerabilities
C) Malicious software designed to disrupt, damage, or gain unauthorized access to systems
D) A tool used to back up data

Correct Answer: C) Malicious software designed to disrupt, damage, or gain unauthorized access to systems

Explanation: Malware refers to any malicious software designed to harm or exploit systems, including viruses, worms, trojans, and ransomware.

Question 32

Which type of software development model focuses on rapid prototyping and iterative improvements?

A) Waterfall model
B) Spiral model
C) Agile methodology
D) V-model

Correct Answer: C) Agile methodology

Explanation: Agile methodology emphasizes rapid prototyping, iterative development, and frequent collaboration with stakeholders to ensure continuous improvement.

Question 33

Which network protocol is commonly used to retrieve email from a mail server?

A) HTTP
B) FTP
C) POP3
D) SNMP

Correct Answer: C) POP3

Explanation: POP3 (Post Office Protocol 3) is a network protocol used to retrieve email from a mail server to a client’s local device.

Question 34

Which of the following is an example of symmetric key encryption?

A) AES
B) RSA
C) ECC
D) DSA

Correct Answer: A) AES

Explanation: AES (Advanced Encryption Standard) is a type of symmetric key encryption where the same key is used for both encryption and decryption.

Question 35

 Which term describes a small program that automates repetitive tasks within a larger program or operating system?

A) Function
B) Loop
C) Macro
D) Shell

Correct Answer: C) Macro

Explanation: A macro is a small program or script that automates repetitive tasks within a larger program, such as word processing or spreadsheet software.

Question 36

 What is the purpose of a denial-of-service (DoS) attack?

A) To steal sensitive data
B) To disable a target by overwhelming it with traffic
C) To encrypt data on a system for ransom
D) To intercept network traffic

Correct Answer: B) To disable a target by overwhelming it with traffic

Explanation: A DoS attack aims to overwhelm a target system with traffic, rendering it unavailable to users by consuming its resources.

Question 37

Which type of software testing is performed by the end users without assistance from developers?

A) Alpha testing
B) Beta testing
C) Unit testing
D) Integration testing

Correct Answer: B) Beta testing

Explanation: Beta testing is performed by end users in a real working environment without assistance from developers, helping to identify any remaining issues.

Question 38

Which cloud computing model provides virtualized computing resources over the internet, such as virtual servers and storage?

A) SaaS
B) PaaS
C) IaaS
D) DaaS

Correct Answer: C) IaaS

Explanation: Infrastructure as a Service (IaaS) provides virtualized computing resources over the internet, such as virtual servers, storage, and networking.

Question 39

 What does the acronym DNS stand for in networking?

A) Domain Name Server
B) Domain Name System
C) Data Network Server
D) Digital Name System

Correct Answer: B) Domain Name System

Explanation: DNS (Domain Name System) translates human-readable domain names, like www.example.com, into IP addresses that computers can understand.

Question 40

Which of the following best describes cloud computing?

A) A method of data storage using local servers
B) The use of computing resources provided over the internet
C) A technique to optimize hardware performance
D) A backup method for local databases

Correct Answer: B) The use of computing resources provided over the internet

Explanation: Cloud computing involves the delivery of computing resources, such as storage and processing power, over the internet, allowing users to access services without relying on local infrastructure.

Complete the Captcha to view next question set.

Prev Post
WGU D332 Practice Exam Questions – Set 5 – Part 1
Next Post
WGU D332 Practice Exam Questions – Set 5 – Part 3