Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Cybersecurity-Architecture-and-Engineering Exam Dumps - WGU Cybersecurity Architecture and Engineering (KFO1/D488)

Go to page:
Question # 41

A security team is investigating multiple man-in-the-middle attacks that have taken place on the corporate network over the past few months. The team needs a solution that will ensure that data is not exposed if a man-in-the-middle attack occurs in the future.

What is the best solution?

A.

Disabling Wi-Fi connections

B.

Enforcing password history

C.

Encrypting data

D.

Ensuring all users have complex passwords

Full Access
Question # 42

A healthcare organization is required to comply with the Health Insurance Portability and Accountability Act (HIPAA), which regulates the privacy and security of personal health information. The organization uses simple network management protocol (SNMP) to manage and monitor its network devices.

Which security control will protect the confidentiality of network device information within this organization?

A.

Access controls

B.

Network segmentation

C.

Encryption

D.

Security monitoring

Full Access
Question # 43

Which system conversion method deploys the new system while the old system is still operational in order to compare output?

A.

Phased

B.

Direct

C.

Parallel

D.

Pilot

Full Access
Question # 44

A security engineer has been asked to audit unapproved changes that have recently taken place in a corporate application.

Which logging mechanism will create an audit trail?

A.

NetFlow logs

B.

Access logs

C.

Packet capture logs

D.

Router logs

Full Access
Question # 45

What is the role of the compiler?

A.

To take the most recent line of code, translate it, and execute the machine code

B.

To create an executable program by translating all of the code at one time

C.

To run scripting languages to test one line of code at a time

D.

To create executable code that is compatible with different operating systems

Full Access
Question # 46

What allows a user to query information from an online database with a web application without revealing what they are viewing?

A.

Secure function evaluation (SFE)

B.

Private function evaluation (PFE)

C.

Homomorphic encryption

D.

Private information retrieval (PIR)

Full Access
Question # 47

A company is concerned about the potential risks associated with unauthorized modifications to the basic input/output system (BIOS) firmware on its servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which technique will prevent unauthorized modifications to the BIOS firmware on a server?

A.

BIOS monitoring

B.

Using an intrusion detection system to detect and prevent attacks

C.

Conducting regular backups of the server's data

D.

BIOS protection

Full Access
Question # 48

The security team manages a set of legacy firewalls that have been in production for nearly ten years. The organization recently issued a mandate requiring that all firewalls be configured with intrusion detection controls that alert the team in real time based on inbound threats.

Which solution meets these requirements?

A.

Replacing the legacy firewalls with a security information and event management (SIEM) appliance

B.

Replacing the legacy firewalls with a load balancer

C.

Replacing the legacy firewalls with next-generation firewalls (NGFWs)

D.

Replacing the legacy firewalls with a reverse proxy

Full Access
Go to page: