Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Cybersecurity-Architecture-and-Engineering Exam Dumps - WGU Cybersecurity Architecture and Engineering (KFO1/D488)

Go to page:
Question # 17

Which risk management strategy will help defeat piracy efforts on a new patient management system?

A.

Configuration of the patient management system to disable all external device connections on all workstations

B.

Incorporation of end-to-end encryption for all patient data

C.

Implementation of regular virus scanning for all workstations

D.

Implementation of licensing technologies in order to restrict unauthorized access to the system

Full Access
Question # 18

The security operations center (SOC) team has been alerted about malicious traffic on the corporate network and is concerned about a distributed denial of service (DDoS) attack. An analyst has been tasked with inspecting network traffic in the on-premises data center to investigate the issue.

Which type of file should the analyst use to inspect the traffic?

A.

Web server access log

B.

Syslog messages

C.

Operating system event log

D.

Packet capture

Full Access
Question # 19

A retail company wants to establish the frequency at which it needs to back up its critical data to ensure it can be restored in case of a disruption with the least amount of acceptable data loss.

What is the term used to describe this metric?

A.

Business Impact Analysis (BIA)

B.

Continuous Data Protection (CDP)

C.

Recovery Point Objective (RPO)

D.

Disaster Recovery (DR)

Full Access
Question # 20

What is one purpose of an End User License Agreement?

A.

Allow customers to legally create and sell a new version of the software

B.

Allow customers to legally use the software

C.

Allow customers to legally modify and compile the source code

D.

Allow customers to legally distribute the application to other users

Full Access
Question # 21

Which data type should be used to calculate 90% of the retail price of an item?

A.

Floating-point

B.

String

C.

Boolean

D.

Auto-number

Full Access
Question # 22

An e-learning company uses Amazon Simple Storage Service (Amazon S3) to store e-books and video files that are served to customers through a custom application. The company has realized that someone has been stealing its intellectual property.

Which threat actor is most likely in this scenario?

A.

Advanced persistent threat

B.

Novice hacker

C.

Competitor

D.

Hacktivist

Full Access
Question # 23

A cybersecurity analyst at a manufacturing company is tasked with analyzing the indicators of compromise (IOCs) to identify potential threats and vulnerabilities within the organization. While viewing the security information and event management (SIEM), the analyst notices an unknown IP address logging on to the company's Secure Shell (SSH) server.

Which potential vulnerability is the manufacturing company facing?

A.

Exfiltration

B.

Unpatched software

C.

Enumeration

D.

Weak passwords

Full Access
Question # 24

Which technique allows someone to obtain a password while it is in transit?

A.

Packet sniffing

B.

Buffer overflow

C.

Phishing

D.

Black hat

Full Access
Go to page: