Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Cybersecurity-Architecture-and-Engineering Exam Dumps - WGU Cybersecurity Architecture and Engineering (KFO1/D488)

Go to page:
Question # 49

Which risk management strategy will ensure the secure configuration and deployment of a new online banking system and help prevent credit card fraud?

A.

Implementation of real-time transaction monitoring

B.

Implementation of a strict firewall policy to restrict access to the system's server

C.

Configuration of the system to disable all email services on all workstations

D.

Use of regular system backups to an off-site location

Full Access
Question # 50

Which item facilitates communication between applications and databases?

A.

Application database

B.

Database driver

C.

Application driver

D.

Database application

Full Access
Question # 51

When is it better to purchase software rather than build a software solution in-house?

A.

When the company has very specific needs

B.

When the company wants internal growth

C.

When there is a short timeline

D.

When the company wants to develop the skill sets of its internal IT staff

Full Access
Question # 52

Which action should an IT department take if an organization decides to expand its business by selling products online?

A.

Make sure the website can handle e-commerce transactions

B.

Ensure that the strategic goals aligned with the organization's mission statement

C.

Market the company’s products or services

D.

Manage capital to ensure a successful website

Full Access
Question # 53

Which IT role is responsible for the installation and maintenance of hardware and software that make up a computer network?

A.

Web administrator

B.

IT manager

C.

Database support specialist

D.

Network administrator

Full Access
Question # 54

An IT organization has recently implemented a hybrid cloud deployment. The server team is deploying a new set of domain-joined Windows servers on cloud-based virtual machines. Users must be able to use their Active Directory credentials to sign in to applications regardless of whether they are running on Windows servers in the cloud or on-premises.

Which solution should be implemented to meet the requirements?

A.

Two-step verification

B.

Challenge-Handshake Authentication Protocol (CHAP)

C.

Privileged identity management

D.

Identity federation

Full Access
Question # 55

A company has recently failed a security audit. Many of the end users have passwords older than 365 days.

Which password policy type will prevent this issue?

A.

Expiration

B.

Length

C.

Recovery

D.

Complexity

Full Access
Question # 56

A company has discovered a vulnerability in its Domain Name System (DNS) that could allow attackers to redirect users to malicious websites. The company has decided to implement a risk management strategy to mitigate this vulnerability.

What is the most effective risk management strategy for this vulnerability?

A.

Increasing the frequency of DNS server patching

B.

Conducting regular security awareness training for employees on the risks of phishing attacks

C.

Implementing Domain Name System Security Extensions (DNSSEC) to digitally sign DNS responses and prevent DNS spoofing attacks

D.

Restricting DNS access to trusted Internet Protocol (IP) addresses only

Full Access
Go to page: