OA Exams

  • web.groovymark@gmail.com
  • December 2, 2024

Question 01

What is the main purpose of a cloud access security broker (CASB)?

a) To provide a secure connection for remote users
b) To mediate access to cloud services
c) To monitor on-premises security
d) To manage local network traffic

Correct Answer: b) To mediate access to cloud services

Explanation: CASBs act as intermediaries that enforce security policies for cloud services by managing access and monitoring user activities.

Question 02

What type of Azure AD object should be used to manage delegation of permissions within an Azure AD administrative unit?

a) Security group
b) User
c) Custom role
d) Built-in role

Correct Answer: d) Built-in role

Explanation: Built-in roles facilitate the delegation of permissions in Azure AD administrative units.

Question 03

What is the primary benefit of using serverless computing?

a) Increased hardware costs
b) No need to manage servers
c) Reduced latency in applications
d) Increased complexity in development

Correct Answer: b) No need to manage servers

Explanation: Serverless computing abstracts the infrastructure management, allowing developers to focus on writing code without worrying about server maintenance.

Question 04

What does the term “zero trust” refer to in cybersecurity?

a) A model that trusts all internal users
b) A model that requires verification for every request
c) A framework for managing firewalls
d) A type of malware

Correct Answer: b) A model that requires verification for every request

Explanation: The zero trust model operates on the principle of "never trust, always verify," meaning every access request must be authenticated and authorized regardless of its origin.

Question 05

Which of the following is a characteristic of the control plane in software-defined networking (SDN)?

a) It forwards data packets
b) It manages traffic policies
c) It monitors network health
d) It establishes physical connections

Correct Answer: b) It manages traffic policies

Explanation: The control plane in SDN is responsible for making decisions about traffic management and routing, setting policies for data flow.

Question 06

 What is the role of the data plane in SDN?

a) To configure network policies
b) To handle actual data traffic
c) To monitor network performance
d) To store network configuration

Correct Answer: b) To handle actual data traffic

Explanation: The data plane is responsible for forwarding and routing the actual data packets based on the policies set by the control plane.

Question 07

In cybersecurity, what does “threat modeling” involve?

a) Assessing the risk of data loss
b) Identifying and assessing potential threats
c) Implementing security controls
d) Responding to security incidents

Correct Answer: b) Identifying and assessing potential threats

Explanation: Threat modeling is a systematic approach to identifying, assessing, and prioritizing threats to a system or application.

Question 08

What does the term “vulnerability” refer to in cybersecurity?

a) A successful attack on a system
b) A weakness that can be exploited
c) A type of malware
d) A security protocol

Correct Answer: b) A weakness that can be exploited

Explanation: A vulnerability is a flaw or weakness in a system that can be exploited by attackers to gain unauthorized access or cause harm.

Question 09

What is the primary purpose of endpoint detection and response (EDR) solutions?

a) To secure cloud environments
b) To provide real-time monitoring of endpoints
c) To manage user access
d) To facilitate data backups

Correct Answer: b) To provide real-time monitoring of endpoints

Explanation: EDR solutions focus on detecting and responding to threats on endpoint devices by providing continuous monitoring and threat detection capabilities.

Question 10

Which of the following is a benefit of using multi-factor authentication (MFA)?

a) Simplified user access
b) Enhanced security
c) Reduced operational costs
d) Faster login times

Correct Answer: b) Enhanced security

Explanation: MFA adds an additional layer of security by requiring multiple forms of verification before granting access, making it more difficult for unauthorized users to gain access.

Question 11

What does “encryption” achieve in data security?

a) It slows down system performance
b) It obscures data to protect it from unauthorized access
c) It permanently deletes data
d) It enhances data visibility

Correct Answer: b) It obscures data to protect it from unauthorized access

Explanation: Encryption transforms data into a format that is unreadable without the appropriate decryption key, protecting it from unauthorized access.

Question 12

In the context of cloud computing, what does the term “hybrid cloud” refer to?

a) A cloud that only supports virtual machines
b) A combination of on-premises and cloud resources
c) A type of public cloud service
d) A proprietary cloud solution

Correct Answer: b) A combination of on-premises and cloud resources

Explanation: A hybrid cloud environment integrates on-premises infrastructure with cloud services, allowing for greater flexibility and deployment options.

Question 13

What is the primary function of a web application firewall (WAF)?

a) To protect network devices
b) To filter and monitor HTTP traffic
c) To encrypt data in transit
d) To authenticate users

Correct Answer: b) To filter and monitor HTTP traffic

Explanation: A WAF is designed to protect web applications by filtering and monitoring HTTP traffic to and from a web application, helping to prevent attacks like SQL injection and cross-site scripting.

Question 14

Which of the following best describes “malware”?

a) Software that improves system performance
b) Software designed to disrupt, damage, or gain unauthorized access
c) A type of encryption
d) A network protocol

Correct Answer: b) Software designed to disrupt, damage, or gain unauthorized access

Explanation: Malware refers to malicious software created to harm, exploit, or otherwise compromise a system or network.

Question 15

What is a significant advantage of using encryption for data at rest?

a) It reduces storage costs
b) It prevents data loss
c) It protects sensitive data from unauthorized access
d) It enhances data sharing capabilities

Correct Answer: c) It protects sensitive data from unauthorized access

Explanation: Encrypting data at rest ensures that even if the data is accessed without authorization, it remains unreadable without the decryption key.

Question 16

What does “data loss prevention” (DLP) technology primarily focus on?

a) Enhancing data backup processes
b) Preventing unauthorized data access or transmission
c) Improving network performance
d) Encrypting data in transit

Correct Answer: b) Preventing unauthorized data access or transmission

Explanation: DLP technology is designed to monitor and control the movement of sensitive data to prevent unauthorized access and data breaches.

Question 17

Which of the following is an example of a technical security control?

a) Security policies
b) User training
c) Firewalls
d) Incident response plans

Correct Answer: c) Firewalls

Explanation: Firewalls are a technical security control used to monitor and filter incoming and outgoing network traffic based on predetermined security rules.

Question 18

What is the primary function of an intrusion detection system (IDS)?

a) To prevent unauthorized access
b) To monitor network traffic for suspicious activity
c) To encrypt sensitive data
d) To manage user permissions

Correct Answer: b) To monitor network traffic for suspicious activity

Explanation: An IDS is designed to detect and alert administrators to potential security breaches or malicious activities within a network.

Question 19

 What is a “phishing” attack?

a) An attack that targets hardware vulnerabilities
b) A social engineering attack to obtain sensitive information
c) A type of denial-of-service attack
d) An attack that uses brute force to crack passwords

Correct Answer: b) A social engineering attack to obtain sensitive information

Explanation: Phishing attacks involve tricking individuals into revealing sensitive information, such as passwords or credit card numbers, often through deceptive emails or websites.

Question 20

In cloud computing, what does “elasticity” refer to?

a) The ability to recover from data loss
b) The ability to scale resources up or down as needed
c) The capability to use multiple cloud providers
d) The process of securing cloud data

Correct Answer: b) The ability to scale resources up or down as needed

Explanation: Elasticity allows cloud services to dynamically allocate resources based on demand, ensuring optimal performance and cost-effectiveness.

Complete the Captcha to view next question set.

Prev Post
WGU D338 Practice Exam Questions – Set 5 – Part 3
Next Post
WGU D340 Practice Exam Questions – Set 1 – Part 2