Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Cybersecurity-Architecture-and-Engineering Exam Dumps - WGU Cybersecurity Architecture and Engineering (KFO1/D488)

Go to page:
Question # 33

Which is true about access rights?

A.

They limit users to permitted items.

B.

They are part of the System Development Life Cycle.

C.

They require the use of a compiler.

D.

They are defined by the machine language.

Full Access
Question # 34

A large corporation is considering expanding its operations into a new geographic region. The corporation is concerned about the potential dangers associated with this expansion.

What is the most important factor to consider when evaluating the potential risks in this scenario?

A.

Impact of attack

B.

Inherent risk

C.

Threat of attack

D.

Likelihood of attack

Full Access
Question # 35

A company is preparing to test its disaster recovery plan, which includes procedures for restoringcritical systems in the event of a disruption. The company wants to conduct a test that is as close to a real disaster as possible without actually disrupting business operations.

Which disaster recovery test will meet the needs of the company?

A.

Walk-through test

B.

Parallel simulation test

C.

Full interruption test

D.

Tabletop exercise

Full Access
Question # 36

What is a component of IT infrastructure?

A.

Data

B.

People

C.

Networks

D.

Printer

Full Access
Question # 37

Match the legislative purpose with the corresponding legislation.

Answer options may be used more than once or not at all.

Full Access
Question # 38

A company wants to improve the security of its software development process and reduce the risk of vulnerabilities in its applications. The company is looking for a solution that can isolate its applications and provide a secure environment for development and testing.

Which security technology meets the needs of this company?

A.

Data loss prevention (DLP)

B.

Virtual private network (VPN)

C.

Firewall

D.

Containerization

Full Access
Question # 39

Which statement best describes the purpose of a business intelligence (Bl) system?

A.

A Bl system allows access to raw data.

B.

A Bl system uses only proprietary data to maximize quality.

C.

A Bl system integrates all departments in an organization.

D.

A Bl system helps the strategic decision-making process.

Full Access
Question # 40

An organization wants to secure remote access to its servers and is looking for a secure protocol that can provide encryption and strong authentication. The organization wants to ensure that its servers can only be accessed by authorized users and that the data exchanged during the session is encrypted.

Which protocol meets the needs of the organization?

A.

Hypertext Transfer Protocol (HTTP)

B.

File Transfer Protocol (FTP)

C.

Telnet

D.

Secure Shell (SSH)

Full Access
Go to page: