Pass the WGU Courses and Certificates Cybersecurity-Architecture-and-Engineering Questions and answers with CertsForce

Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions
Questions # 11:

A security team has been informed that user data on the network has been compromised.

What is the first step the organization should take to respond to this data breach?

Options:

A.

Notify affected users of the incident


B.

Implement an access control policy


C.

Increase encryption levels


D.

Publicly announce the breach


Expert Solution
Questions # 12:

A company has discovered a vulnerability in its Domain Name System (DNS) that could allow attackers to redirect users to malicious websites. The company has decided to implement a risk management strategy to mitigate this vulnerability.

What is the most effective risk management strategy for this vulnerability?

Options:

A.

Increasing the frequency of DNS server patching


B.

Conducting regular security awareness training for employees on the risks of phishing attacks


C.

Implementing Domain Name System Security Extensions (DNSSEC) to digitally sign DNS responses and prevent DNS spoofing attacks


D.

Restricting DNS access to trusted Internet Protocol (IP) addresses only


Expert Solution
Questions # 13:

An organization wants to securely transmit sensitive information between two parties. The organization wants to use a cryptographic technique that allows both parties to encrypt anddecrypt messages using the same key. The organization is also concerned about the performance impact of the encryption technique.

Which type of cryptographic algorithm meets the needs of the organization?

Options:

A.

Block cipher


B.

Hash function


C.

Symmetric algorithm


D.

Asymmetric algorithm


Expert Solution
Questions # 14:

What is the role of the compiler?

Options:

A.

To take the most recent line of code, translate it, and execute the machine code


B.

To create an executable program by translating all of the code at one time


C.

To run scripting languages to test one line of code at a time


D.

To create executable code that is compatible with different operating systems


Expert Solution
Questions # 15:

A cloud hosting provider is concerned about the potential risks associated with attacks that target the confidentiality and integrity of sensitive data stored on its servers' volatile storage. The provider has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this provider?

Options:

A.

Implementing secure encrypted enclaves and Advanced Micro Devices (AMD) Secure Memory Encryption


B.

Conducting regular security awareness training for all employees


C.

Implementing a next-generation antivirus system to detect and prevent malware attacks


D.

Enforcing a strong password complexity policy for all user accounts


Expert Solution
Questions # 16:

A cloud service provider is concerned about the potential risks associated with hardware-based attacks on its virtual machines. The provider has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this provider?

Options:

A.

Conducting regular vulnerability assessments and penetration testing


B.

Disabling central processing unit (CPU) virtualization support


C.

Implementing a web application firewall to monitor incoming traffic


D.

Enforcing strict access control policies for all users


Expert Solution
Questions # 17:

Which device does a Local Area Network (LAN) need to communicate over the Internet?

Options:

A.

Multiplexer


B.

Repeater


C.

Switch


D.

Router


Expert Solution
Questions # 18:

How can the organizational culture support ethical guidelines?

Options:

A.

By outlining the roles of IT specialists in the organization


B.

By outlining the protocols to support security and privacy of data


C.

By creating the system requirements for computers in the organization


D.

By creating the government regulations that apply to the organization


Expert Solution
Questions # 19:

Which database has multiple tables with interrelated fields?

Options:

A.

Interrelated


B.

Hierarchical


C.

Flat file


D.

Relational


Expert Solution
Questions # 20:

A company is concerned about the potential risks associated with unauthorized modifications to the Basic Input/Output System (BIOS) firmware on its servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which technique will prevent unauthorized modifications to the BIOS firmware on a server?

Options:

A.

Using an intrusion detection system to detect and prevent attacks


B.

BIOS protection


C.

BIOS monitoring


D.

Conducting regular backups of the server’s data


Expert Solution
Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions