OA Exams

  • web.groovymark@gmail.com
  • December 2, 2024

Question 41

What is “social media risk management”?

a) A method for monitoring network traffic
b) Managing risks associated with social media use within an organization
c) A type of malware
d) A process for securing physical assets

Correct Answer: b) Managing risks associated with social media use within an organization

Explanation: Social media risk management helps organizations protect their reputation and sensitive information in online environments.

Question 42

What is “network segmentation”?

a) Dividing a computer network into smaller parts for improved security and performance
b) A type of malware
c) A method of data encryption
d) A process for managing user accounts

Correct Answer: a) Dividing a computer network into smaller parts for improved security and performance

Explanation: Network segmentation enhances security by limiting the attack surface and containing potential threats.

Question 43

What does “cloud access security broker” (CASB) do?

a) A method for monitoring network traffic
b) Acts as a security policy enforcement point between cloud service users and providers
c) A type of malware
d) A process for managing user accounts

Correct Answer: b) Acts as a security policy enforcement point between cloud service users and providers

Explanation: CASBs help organizations secure data in the cloud by providing visibility and control over cloud usage.

Question 44

What is “spear phishing”?

a) A general phishing attempt
b) A targeted phishing attack aimed at a specific individual or organization
c) A method of data backup
d) A type of malware

Correct Answer: b) A targeted phishing attack aimed at a specific individual or organization

Explanation: Spear phishing is more sophisticated than regular phishing and often uses personal information to increase its chances of success.

Question 45

 What does “cryptography” involve?

a) The process of monitoring network traffic
b) Techniques for securing communication by encoding messages
c) A type of malware
d) A method of data backup

Correct Answer: b) Techniques for securing communication by encoding messages

Explanation: Cryptography is essential for protecting sensitive information and ensuring privacy in communications.

Question 46

 What is “physical layer security”?

a) Security measures at the hardware level
b) A method of data encryption
c) A type of malware
d) A process for managing user accounts

Correct Answer: a) Security measures at the hardware level

Explanation: Physical layer security protects data at the hardware level, preventing unauthorized access to physical devices.

Question 47

 What does “system hardening” involve?

a) Increasing the performance of a system
b) Securing a system by reducing its surface of vulnerability
c) A method of data backup
d) A type of malware

Correct Answer: b) Securing a system by reducing its surface of vulnerability

Explanation: System hardening enhances security by minimizing the potential attack vectors available to malicious actors.

Question 48

What is a “security breach”?

a) A minor software bug
b) An incident where unauthorized access is gained to a system
c) A method of data encryption
d) A type of malware

Correct Answer: b) An incident where unauthorized access is gained to a system

Explanation: Security breaches can lead to data loss, theft, and reputational damage.

Question 49

What does “application security” refer to?

a) The practice of securing applications against threats
b) A type of malware
c) A method of data encryption
d) A process for managing user accounts

Correct Answer: a) The practice of securing applications against threats

Explanation: Application security involves implementing measures to protect software applications from vulnerabilities and attacks.

Question 50

What is “digital forensics”?

a) The process of securing physical assets
b) The practice of recovering and analyzing data from digital devices for investigations
c) A method of data encryption
d) A type of malware

Correct Answer: b) The practice of recovering and analyzing data from digital devices for investigations

Explanation: Digital forensics helps organizations investigate cyber incidents and gather evidence for legal proceedings.

Complete the Captcha to view next question set.

Prev Post
WGU D340 Practice Exam Questions – Set 4 – Part 2
Next Post
WGU D340 Practice Exam Questions – Set 5 – Part 1