Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Cybersecurity-Architecture-and-Engineering Exam Dumps - WGU Cybersecurity Architecture and Engineering (KFO1/D488)

Go to page:
Question # 4

A company with a hybrid cloud deployment needs to identify all possible threat types that could impact production systems.

Which threat hunting technique should be used to identify potential attacks that have already occurred?

A.

Honeypots

B.

Log analysis

C.

Social engineering

D.

Penetration testing

Full Access
Question # 5

A software development company is concerned about the potential risks associated with exploits that target vulnerabilities in the Linux operating system used by the company’s servers. Thecompany has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

A.

Enforcing strict access control policies for all users

B.

Implementing a host-based intrusion detection and prevention system

C.

Conducting regular security assessments and penetration testing

D.

Implementing shell restrictions

Full Access
Question # 6

Which risk management strategy will help prevent cheating using a learning management system as a platform?

A.

Implementation of secure user authentication protocols

B.

Implementation of regular software updates and patch management

C.

Enforcement of a strict firewall policy to restrict access to the system’s server

D.

Configuration of the system to disable all Bluetooth services on all workstations

Full Access
Question # 7

An organization wants to ensure that its website is free of certain vulnerabilities before the final handoff to the client. What testing method should the organization use to inspect traffic and detect potential issues?

A.

HTTP interceptor

B.

Port scanner

C.

Bastion scanner

Full Access
Question # 8

A cloud hosting provider is concerned about the potential risks associated with attacks that target the confidentiality and integrity of sensitive data stored on its servers' volatile storage. The provider has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this provider?

A.

Implementing secure encrypted enclaves and Advanced Micro Devices (AMD) Secure Memory Encryption

B.

Conducting regular security awareness training for all employees

C.

Implementing a next-generation antivirus system to detect and prevent malware attacks

D.

Enforcing a strong password complexity policy for all user accounts

Full Access
Go to page: