Pass the WGU Courses and Certificates Cybersecurity-Architecture-and-Engineering Questions and answers with CertsForce

Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions
Questions # 21:

A healthcare organization has experienced a ransomware attack that has resulted in the encryption of all patient medical records. The organization has backups, but restoring the data will take severaldays, and during that time, patient care will be significantly diminished.

What is the most important factor to consider when evaluating the severity of the ransomware attack?

Options:

A.

Threat actors


B.

Risk


C.

Impact


D.

Likelihood


Expert Solution
Questions # 22:

The security operations center (SOC) team has been alerted about malicious traffic on the corporate network and is concerned about a distributed denial of service (DDoS) attack. An analyst has been tasked with inspecting network traffic in the on-premises data center to investigate the issue.

Which type of file should the analyst use to inspect the traffic?

Options:

A.

Web server access log


B.

Syslog messages


C.

Operating system event log


D.

Packet capture


Expert Solution
Questions # 23:

Which risk management strategy will ensure the secure storage of data on a new document management system?

Options:

A.

Configuration of the system to require frequent password changes


B.

Incorporation of a strict firewall policy to restrict access to the system’s server


C.

Implementation of encryption for all data stored in the system


D.

Implementation of a secure virtual private network (VPN) connection for all remote access to the system


Expert Solution
Questions # 24:

Which risk management strategy will help prevent cheating using a learning management system as a platform?

Options:

A.

Enforcement of a strict firewall policy to restrict access to the system's server


B.

Configuration of the system to disable all Bluetooth services on all workstations


C.

Implementation of secure user authentication protocols


D.

Implementation of regular software updates and patch management


Expert Solution
Questions # 25:

An IT organization has recently migrated its servers to the cloud. The security team needs to delegate administrative control of multiple cloud services to various administrators inside the company. This team needs a granular solution that will offer the most flexibility while maintaining a secure posture.

What is the best solution?

Options:

A.

Open Authorization (OAuth)


B.

Security Assertion Markup Language (SAML)


C.

Role-based access control (RBAC)


D.

Kerberos


Expert Solution
Questions # 26:

Which IT role is responsible for the installation and maintenance of hardware and software that make up a computer network?

Options:

A.

Web administrator


B.

IT manager


C.

Database support specialist


D.

Network administrator


Expert Solution
Questions # 27:

A software development company uses file transfer protocol (FTP) to transfer software code between different teams.

Which security control is essential for protecting the integrity of software code that is transferred using FTP?

Options:

A.

Calculating and comparing the hash values of the software code before and after transfer using FTP can help detect any changes and ensure the integrity of the code.


B.

Implementing intrusion detection and prevention systems can help detect and prevent unauthorized access to the FTP server and software code.


C.

Enforcing strict access controls can limit the number of users with access to the FTP server and prevent unauthorized access.


D.

Regularly backing up the software code stored in the FTP server and having a disaster recovery plan can help ensure the integrity of the software code.


Expert Solution
Questions # 28:

Which security technique should be used to prevent data exfiltration?

Options:

A.

Intrusion Detection Software (IDS)


B.

Data Loss Prevention (DLP)


C.

Multi-Factor Authentication (MFA)


D.

Intrusion Prevention Software (IPS)


Expert Solution
Questions # 29:

What does the following SQL statement produce when executed?

SELECT ‘ FROM Customers

WHERE State = 'Arizona';

Options:

A.

All of the records from the Customers table


B.

All of the records from the Customers database


C.

All of the records from the Customers database that are located in Arizona


D.

All of the records from the Customers table that are located in Arizona


Expert Solution
Questions # 30:

A company is concerned about the security of its users’ passwords and is looking for a solution to ensure that user credentials are kept safe.

What is the best solution?

Options:

A.

Object storage


B.

Password policies


C.

Removable storage


D.

Hardware key manager


Expert Solution
Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions