OA Exams

  • web.groovymark@gmail.com
  • December 2, 2024

Question 21

What is the purpose of a security audit?

a) To evaluate and improve system performance
b) To assess compliance with security policies and regulations
c) To develop new software features
d) To monitor network traffic

Correct Answer: b) To assess compliance with security policies and regulations

Explanation: A security audit evaluates an organization's security practices to ensure compliance with established policies and standards.

Question 22

What does “malicious software” encompass?

a) Software that improves system speed
b) Software designed to harm or exploit systems
c) User interface design tools
d) Software used for data analysis

Correct Answer: b) Software designed to harm or exploit systems

Explanation: Malicious software includes viruses, worms, ransomware, and other types of harmful software intended to disrupt or damage systems.

Question 23

What is “data leakage”?

a) Unauthorized access to sensitive data
b) Data storage on local devices
c) Data compression techniques
d) Secure data transfer methods

Correct Answer: a) Unauthorized access to sensitive data

Explanation: Data leakage occurs when confidential information is unintentionally exposed to unauthorized parties.

Question 24

Which of the following is a characteristic of a strong password?

a) Short and simple
b) Contains personal information
c) A mix of letters, numbers, and symbols
d) Used for multiple accounts

Correct Answer: c) A mix of letters, numbers, and symbols

Explanation: A strong password combines various character types and avoids predictable patterns to enhance security.

Question 25

 What is the role of a digital certificate?

a) To encrypt data
b) To authenticate the identity of users or devices
c) To improve system performance
d) To manage user accounts

Correct Answer: b) To authenticate the identity of users or devices

Explanation: Digital certificates verify the identity of individuals or entities, ensuring secure communication over networks.

Question 26

What is “SSL/TLS” used for?

a) Data compression
b) Secure communication over the internet
c) Monitoring network traffic
d) Creating software applications

Correct Answer: b) Secure communication over the internet

Explanation: SSL (Secure Sockets Layer) and TLS (Transport Layer Security) encrypt data transmitted between web servers and clients to secure communications.

Question 27

What is the purpose of a network segmentation?

a) To improve network performance
b) To isolate and secure different parts of a network
c) To reduce data storage requirements
d) To enhance user experience

Correct Answer: b) To isolate and secure different parts of a network

Explanation: Network segmentation divides a network into smaller parts to enhance security and improve performance.

Question 28

What does “BYOD” stand for?

a) Bring Your Own Device
b) Backup Your Online Data
c) Build Your Own Database
d) Buy Your Own Domain

Correct Answer: a) Bring Your Own Device

Explanation: BYOD refers to the policy that allows employees to use their personal devices for work purposes.

Question 29

Which of the following is a method for protecting sensitive information?

a) Storing data in unencrypted formats
b) Implementing access controls
c) Sharing passwords with colleagues
d) Ignoring software updates

Correct Answer: b) Implementing access controls

Explanation: Access controls limit who can view or use sensitive information, reducing the risk of unauthorized access.

Question 30

What is “network monitoring”?

a) Analyzing software performance
b) Tracking and analyzing network traffic for anomalies
c) Managing user accounts
d) Developing network protocols

Correct Answer: b) Tracking and analyzing network traffic for anomalies

Explanation: Network monitoring involves observing and analyzing network activity to detect issues and potential security threats.

Question 31

What is the main purpose of a cybersecurity policy?

a) To increase system performance
b) To establish guidelines for managing security risks
c) To develop software applications
d) To monitor network traffic

Correct Answer: b) To establish guidelines for managing security risks

Explanation: A cybersecurity policy outlines the rules and procedures for protecting an organization's information and systems.

Question 32

What is the function of intrusion detection systems (IDS)?

a) To encrypt sensitive data
b) To detect and alert on suspicious activities
c) To improve system performance
d) To manage user access

Correct Answer: b) To detect and alert on suspicious activities

Explanation: IDS monitors network traffic for malicious activities and alerts administrators to potential security breaches.

Question 33

What does “security patching” involve?

a) Ignoring software updates
b) Applying updates to fix vulnerabilities in software
c) Monitoring network traffic
d) Encrypting sensitive data

Correct Answer: b) Applying updates to fix vulnerabilities in software

Explanation: Security patching addresses known vulnerabilities in software to protect against exploitation.

Question 34

Which of the following is a benefit of cloud computing?

a) Increased physical hardware requirements
b) Reduced flexibility in scaling resources
c) Enhanced accessibility and collaboration
d) Limited storage options

Correct Answer: c) Enhanced accessibility and collaboration

Explanation: Cloud computing allows users to access data and applications from anywhere, promoting collaboration and flexibility.

Question 35

What is the purpose of a business continuity plan (BCP)?

a) To enhance system performance
b) To outline procedures for maintaining operations during disruptions
c) To develop new software applications
d) To manage user accounts

Correct Answer: b) To outline procedures for maintaining operations during disruptions

Explanation: A BCP prepares an organization to respond effectively to interruptions, ensuring essential functions continue.

Question 36

What is a common use of public key infrastructure (PKI)?

a) Encrypting data at rest
b) Managing digital certificates and keys
c) Improving network performance
d) Developing software applications

Correct Answer: b) Managing digital certificates and keys

Explanation: PKI provides the framework for creating, managing, and validating digital certificates and encryption keys for secure communications.

Question 37

What does “data governance” refer to?

a) The management of data availability and integrity
b) The development of software applications
c) The process of data storage
d) The monitoring of network traffic

Correct Answer: a) The management of data availability and integrity

Explanation: Data governance establishes policies and procedures for ensuring data accuracy, security, and usability within an organization.

Question 38

What is the main risk of using outdated software?

a) Improved performance
b) Enhanced security features
c) Vulnerability to exploitation by cyber attackers
d) Increased compatibility with new systems

Correct Answer: c) Vulnerability to exploitation by cyber attackers

Explanation: Outdated software may contain known vulnerabilities that attackers can exploit, increasing security risks.

Question 39

What is “data integrity”?

a) The speed at which data is processed
b) The accuracy and consistency of data over its lifecycle
c) The size of data storage
d) The availability of data to users

Correct Answer: b) The accuracy and consistency of data over its lifecycle

Explanation: Data integrity ensures that data remains accurate and consistent throughout its lifecycle, preventing corruption or unauthorized changes.

Question 40

What is a “security breach”?

a) An authorized access to data
b) A failure to enforce access controls
c) An incident where unauthorized access to information occurs
d) A software update

Correct Answer: c) An incident where unauthorized access to information occurs

Explanation: A security breach is any event that results in unauthorized access to or disclosure of sensitive information.

Complete the Captcha to view next question set.

Prev Post
WGU D340 Practice Exam Questions – Set 2 – Part 1
Next Post
WGU D340 Practice Exam Questions – Set 2 – Part 3