Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Cybersecurity-Architecture-and-Engineering Exam Dumps - WGU Cybersecurity Architecture and Engineering (KFO1/D488)

Go to page:
Question # 9

A cybersecurity analyst at a healthcare organization was tasked with analyzing the indicators of compromise (IOCs) to identify potential threats and vulnerabilities within the enterprise. Theanalyst notices unknown users logging on to the company's wireless local-area network (WLAN).

What is a potential vulnerability the healthcare organization is facing based on the IOCs identified?

A.

Unsecured wireless access points

B.

Up-to-date anti-malware software

C.

A strong password policy

D.

Regular security awareness training for employees

Full Access
Question # 10

What allows a user to query information from an online database with a web application without revealing what they are viewing?

A.

Private Information Retrieval (PIR)

B.

Homomorphic encryption

C.

Secure Function Evaluation (SFE)

D.

Private Function Evaluation (PFE)

Full Access
Question # 11

A healthcare provider is required to comply with the Health Insurance Portability and Accountability Act (HIPAA), which sets requirements for the protection of patient healthinformation. The provider uses various software applications to manage and store patient health information, which must be coded to protect its confidentiality and integrity.

Which protocol will meet the needs of this provider?

A.

Wired Equivalent Privacy (WEP)

B.

Advanced Encryption Standard (AES)

C.

Simple Mail Transfer Protocol (SMTP)

D.

Rivest-Shamir-Adleman (RSA)

Full Access
Question # 12

A government agency is evaluating its business continuity plan to ensure that its operations can continue during a crisis.

What is the term used to describe the critical services that must be maintained during a disruption?

A.

Business continuity planning (BCP)

B.

Disaster recovery (DR)

C.

Recovery point objective (RPO)

D.

Mission essential functions (MEFs)

Full Access
Question # 13

An engineer has noticed increased network traffic originating from an unknown internet protocol (IP) address.

Which action should be taken to analyze the unusual network traffic patterns?

A.

Permanently block all incoming traffic from the unknown IP address

B.

Compare the unknown address to known IP addresses to determine if it is a threat

C.

Temporarily block all incoming traffic from the unknown IP address

D.

Rate limit incoming traffic from the unknown IP address

Full Access
Question # 14

Which stream cipher is a variant of the Salsa20 cipher, designed to be fast, secure, and resistant to cryptanalysis, and is commonly used in combination with the Poly1305 authentication mode?

A.

Counter (CTR)

B.

Cipher block chaining (CBC)

C.

ChaCha

D.

Electronic codebook (ECB)

Full Access
Question # 15

The DevSecOps team for an organization manages a continuous integration and continuous deployment (CI/CD) pipeline for a three-tier web application. Management has asked the team toperform a series of comprehensive post-deployment tests to make sure that all of the components of the application can interact and function properly.

What should the team recommend?

A.

Static code analysis

B.

Dynamic code analysis

C.

Integration testing

D.

Package scanning

Full Access
Question # 16

Which risk management strategy will help prevent cheating using a learning management system as a platform?

A.

Enforcement of a strict firewall policy to restrict access to the system's server

B.

Configuration of the system to disable all Bluetooth services on all workstations

C.

Implementation of secure user authentication protocols

D.

Implementation of regular software updates and patch management

Full Access
Go to page: