Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Cybersecurity-Architecture-and-Engineering Exam Dumps - WGU Cybersecurity Architecture and Engineering (KFO1/D488)

Go to page:
Question # 57

A large technology company has discovered a known vulnerability in its network infrastructure. The infrastructure contains a number of retired assets that are no longer receiving security updates, which can potentially be exploited by attackers to compromise the network. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

A.

Enforcing strict access control policies for all network devices

B.

Conducting regular vulnerability scans to identify potential weaknesses

C.

Implementing intrusion detection and prevention systems (IDPS)

D.

Removing all end-of-life devices from the network

Full Access
Question # 58

How can the organizational culture support ethical guidelines?

A.

By outlining the roles of IT specialists in the organization

B.

By outlining the protocols to support security and privacy of data

C.

By creating the system requirements for computers in the organization

D.

By creating the government regulations that apply to the organization

Full Access
Question # 59

Which characteristic applies to machine-level languages?

A.

They use language translators known as compilers

B.

They use cables to connect circuits

C.

They use collection of short scripts

D.

They use language translators known as assemblers

Full Access
Question # 60

Which device does a Local Area Network (LAN) need to communicate over the Internet?

A.

Multiplexer

B.

Repeater

C.

Switch

D.

Router

Full Access
Question # 61

A healthcare organization would like to interoperate with another healthcare organization without needing to maintain individual accounts for members of the other organization.

Which technology concept should the company use?

A.

Single Sign-On (SSO)

B.

Federated Authentication

C.

Multi-Factor Authentication (MFA)

D.

Cloud Identity Provider

Full Access
Question # 62

What is an information system?

A.

The hardware that allows human-computer interactions

B.

A database utility from a third party

C.

The computer hardware components

D.

A collection of data to support an organization

Full Access
Question # 63

A company has identified a potential risk associated with a new software implementation, which could result in a significant data breach.

Which step of the risk management life cycle involves implementing security controls to prevent the risk?

A.

Assess

B.

Identify

C.

Control

D.

Review

Full Access
Question # 64

What does the following SQL statement produce when executed?

SELECT ‘ FROM Customers

WHERE State = ’Arizona';

A.

All of the records from the Customers table

B.

All of the records from the Customers database

C.

All of the records from the Customers database that are located in Arizona

D.

All of the records from the Customers table that are located in Arizona

Full Access
Go to page: