100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

WGU D386 Hardware & Operating Systems Essentials – PA Exam 2025–2026 | 80 Questions | Verified Answers & Rationales

Puntuación
-
Vendido
-
Páginas
39
Grado
A+
Subido en
10-01-2026
Escrito en
2025/2026

WGU D386 Hardware & Operating Systems Essentials – PA Exam 2025–2026 | 80 Questions | Verified Answers & Rationales

Institución
WGU D386 Hardware & Operating Systems Essentials –
Grado
WGU D386 Hardware & Operating Systems Essentials –











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU D386 Hardware & Operating Systems Essentials –
Grado
WGU D386 Hardware & Operating Systems Essentials –

Información del documento

Subido en
10 de enero de 2026
Número de páginas
39
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU D386 Hardware & Operating Systems
Essentials – PA Exam 2025–2026 | 80
Questions | Verified Answers & Rationales

FULL PACK COMPLETE

80 Total Exam Questions
Multiple Choice Format
Verified Answers
3–5 Sentence Rationales
WGU D386 PA / OA Focused
2026 Updated


Q1.

Which type of virus intends to make itself difficult to detect or analyze?

A. Trojan horse
B. Logic bomb
C. Armored virus
D. Rootkit

Correct Answer: C

Rationale:
An armored virus is specifically designed to resist detection and analysis
by antivirus tools. It uses encryption, obfuscation, or self-modifying
code to hide its presence. Trojan horses disguise themselves as
legitimate software, while logic bombs activate on specific conditions.
Rootkits hide system-level access but are not primarily designed for

,analysis resistance like armored viruses.

Q2.

Which service or role is an example of a use case for containers?

A. Monoliths
B. Microservices
C. Leased lines
D. Web services

Correct Answer: B

Rationale:
Containers are best suited for microservices because they package
applications and dependencies into lightweight, portable units.
Microservices architectures rely on independently deployable
components, which containers support efficiently. Monoliths do not
benefit significantly from containerization. Leased lines and web
services are networking concepts, not container use cases.

Q3.

Which connection-oriented protocol can be used to set up a secure
session for remote logins?

A. Remote Desktop Protocol (RDP)
B. Secure Shell (SSH)
C. Network Time Protocol (NTP)
D. File Transfer Protocol (FTP)

Correct Answer: B

Rationale:
SSH is a secure, connection-oriented protocol used to establish

,encrypted remote login sessions. It protects data from interception
through strong encryption. RDP provides remote desktop access but is
not primarily a secure shell protocol. NTP synchronizes time, and FTP
transfers files without default encryption.

Q4.

What is the main protocol at the Internet layer of the TCP/IP model and
considered the workhorse of TCP/IP?

A. DRAM
B. High-end CPU
C. IP
D. Volatility

Correct Answer: C

Rationale:
The Internet Protocol (IP) is the core protocol of the Internet layer in the
TCP/IP model. It handles addressing and routing of packets across
networks. Without IP, devices could not communicate across
interconnected systems. The other options are hardware or unrelated
concepts.

Q5.

Which database is the best option for storing data in RAM when creating
a back-end stack?

A. Cassandra
B. Redis
C. LAN
D. Apache

Correct Answer: B

, Rationale:
Redis is an in-memory database designed for high-speed data storage
and retrieval. It stores data directly in RAM, making it ideal for caching
and real-time applications. Cassandra is a disk-based distributed
database. LAN and Apache are not databases.

Q6.

Which type of non-functional requirement (NFR) ensures that an
updated database can return back in the event of update failures?

A. Security
B. Reliability
C. Performance
D. Usability

Correct Answer: B

Rationale:
Reliability ensures that systems recover from failures and return to a
stable state. Database rollback and recovery mechanisms fall under
reliability requirements. Security focuses on protection from threats.
Performance and usability do not address recovery from failed updates.

GENERATED EXAM QUESTIONS CONTINUE
Q7.

Which component is considered the “brain” of a computer?

A. RAM
B. CPU
C. Hard drive
D. Power supply
$25.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Lectjarnniey Chamberlain College Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
71
Miembro desde
2 año
Número de seguidores
43
Documentos
3094
Última venta
1 semana hace
Your Success, Our Blueprint

Your Success, Our Blueprint

4.3

13 reseñas

5
8
4
3
3
1
2
0
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes