OA Exams

  • California, TX 70240
  • Info@gmail.com
  • Office Hours: 8:00 AM – 7:45 PM
  • web.groovymark@gmail.com
  • December 2, 2024

Question 41

What is a “SQL injection”?

a) A method of encrypting data
b) An attack that allows an attacker to execute arbitrary SQL code on a database
c) A type of malware
d) A user authentication method

Correct Answer: b) An attack that allows an attacker to execute arbitrary SQL code on a database

Explanation: SQL injection exploits vulnerabilities in web applications that use SQL databases.

Question 42

What is “patch Tuesday”?

a) A method of user authentication
b) The second Tuesday of each month when Microsoft releases security patches
c) A type of malware
d) A data backup solution

Correct Answer: b) The second Tuesday of each month when Microsoft releases security patches

Explanation: Patch Tuesday helps organizations keep their systems secure by providing regular updates.

Question 43

What does “physical security” refer to?

a) The practice of securing digital data
b) Protecting physical assets from threats such as theft, vandalism, and natural disasters
c) A type of malware
d) A data backup solution

Correct Answer: b) Protecting physical assets from threats such as theft, vandalism, and natural disasters

Explanation: Physical security involves measures to safeguard buildings, equipment, and personnel.

Question 44

What is a “security breach”?

a) A successful attempt to exploit a vulnerability
b) A method of data encryption
c) A type of malware
d) A data backup solution

Correct Answer: a) A successful attempt to exploit a vulnerability

Explanation: Security breaches can lead to unauthorized access to data and systems, causing harm to organizations.

Question 45

What does “data integrity” refer to?

a) The accuracy and consistency of data over its lifecycle
b) A type of malware
c) A method of data encryption
d) A network monitoring tool

Correct Answer: a) The accuracy and consistency of data over its lifecycle

Explanation: Data integrity ensures that information is reliable and can be trusted.

Question 46

What is “authentication”?

a) The process of identifying users and granting access to systems
b) A method of data encryption
c) A type of malware
d) A network monitoring tool

Correct Answer: a) The process of identifying users and granting access to systems

Explanation: Authentication verifies the identity of a user or system before allowing access.

Question 47

What is “encryption in transit”?

a) Encrypting data stored on disk
b) Encrypting data while it is being transmitted over a network
c) A type of malware
d) A data backup solution

Correct Answer: b) Encrypting data while it is being transmitted over a network

Explanation: Encryption in transit protects data from interception during transmission.

Question 48

What does “malware prevention” involve?

a) Ensuring users are aware of safe computing practices
b) Only using antivirus software
c) Backing up data regularly
d) A method of data encryption

Correct Answer: a) Ensuring users are aware of safe computing practices

Explanation: Malware prevention requires a combination of technical and human factors to effectively mitigate threats.

Question 49

 What is “cybersecurity training”?

a) A method for encrypting data
b) Educating employees about security policies and safe computing practices
c) A type of malware
d) A data backup solution

Correct Answer: b) Educating employees about security policies and safe computing practices

Explanation: Cybersecurity training helps reduce the risk of human error and improves overall security posture.

Question 50

 What is “disaster recovery planning”?

a) A method of user authentication
b) Developing a strategy for recovering from a disaster and restoring normal operations
c) A type of malware
d) A data backup solution

Correct Answer: b) Developing a strategy for recovering from a disaster and restoring normal operations

Explanation: Disaster recovery planning ensures that organizations can quickly recover from disruptive events.

Complete the Captcha to view next question set.

Prev Post
WGU D340 Practice Exam Questions – Set 5 – Part 2
Next Post
WGU D351 Practice Exam Questions – Set 1 – Part 1