Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Cybersecurity-Architecture-and-Engineering Exam Dumps - WGU Cybersecurity Architecture and Engineering (KFO1/D488)

Go to page:
Question # 25

Which risk management strategy will ensure that data stored on an Enterprise Resource Planning (ERP) system is secure from exploitation in the event of a data breach?

A.

Implementation of data encryption

B.

Enforcement of a strict firewall policy to restrict access to the ERP system’s server

C.

Implementation of regular backup and disaster recovery planning

D.

Configuration of the ERP system to disable all printing services on all workstations

Full Access
Question # 26

Which protocol can be used to provide secure email communication and ensure the confidentiality, integrity, and authenticity of email messages?

A.

Simple Mail Transfer Protocol (SMTP)

B.

Pretty Good Privacy (PGP)

C.

Secure/Multipurpose Internet Mail Extensions (S/MIME)

D.

Internet Protocol Security (IPsec)

Full Access
Question # 27

Which algorithm is suitable for ensuring the integrity of digital documents and detecting any unauthorized modifications?

A.

Rivest–Shamir–Adleman (RSA)

B.

Data Encryption Standard (DES)

C.

Advanced Encryption Standard (AES)

D.

Secure Hash Algorithm 256 (SHA-256)

Full Access
Question # 28

Which risk management strategy will ensure the secure configuration and deployment of a new online banking system and help prevent credit card fraud?

A.

Use of regular system backups to an off-site location

B.

Implementation of real-time transaction monitoring

C.

Implementation of a strict firewall policy to restrict access to the system’s server

D.

Configuration of the system to disable all email services on all workstations

Full Access
Question # 29

A professional services organization deployed security edge devices in key locations on its corporate network.

How will these devices improve the organization's security posture?

A.

They act as an initial defense layer for potential threats

B.

They protect from severe distributed denial-of-service (DDoS) attacks

C.

They act as a security information and event management (SIEM) module for a security operations center (SOC) analyst

D.

They are a set of trusted platform module (TPM) devices

Full Access
Question # 30

A company has recently experienced a data breach from an insider threat and wants to implement a policy to reduce the risk of similar incidents in the future. During the incident, the insider threat accessed sensitive information stored in the administrator account from their user account. The insider threat was not in a supervisory role at the time of the incident.

Which policy should the company implement?

A.

Password complexity policy

B.

Separation of duties

C.

Least privilege

D.

Job rotation

Full Access
Question # 31

Which stream cipher is a variant of the Salsa20 cipher, designed to be fast, secure, and resistant to cryptanalysis, and is commonly used in combination with the Poly1305 authentication mode?

A.

ChaCha

B.

Cipher Block Chaining (CBC)

C.

Counter (CTR)

D.

Electronic Codebook (ECB)

Full Access
Question # 32

Which key exchange algorithm is based on advanced cryptography algorithms and is a more efficient alternative to traditional key exchange algorithms?

A.

Diffie-Hellman (DH)

B.

Elliptic Curve Diffie-Hellman (ECDH)

C.

Rivest-Shamir-Adleman (RSA)

D.

Digital Signature Algorithm (DSA)

Full Access
Go to page: