Pass the WGU Courses and Certificates Cybersecurity-Architecture-and-Engineering Questions and answers with CertsForce

Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions
Questions # 31:

A healthcare organization would like to interoperate with another healthcare organization without needing to maintain individual accounts for members of the other organization.

Which technology concept should the company use?

Options:

A.

Single Sign-On (SSO)


B.

Federated Authentication


C.

Multi-Factor Authentication (MFA)


D.

Cloud Identity Provider


Expert Solution
Questions # 32:

Which risk management strategy will ensure that data stored on an enterprise resource planning (ERP) system is secure from exploitation in the event of a data breach?

Options:

A.

Enforcement of a strict firewall policy to restrict access to the ERP system's server


B.

Configuration of the ERP system to disable all printing services on all workstations


C.

Implementation of regular backup and disaster recovery planning


D.

Implementation of data encryption


Expert Solution
Questions # 33:

What is one purpose of an End User License Agreement?

Options:

A.

Allow customers to legally create and sell a new version of the software


B.

Allow customers to legally use the software


C.

Allow customers to legally modify and compile the source code


D.

Allow customers to legally distribute the application to other users


Expert Solution
Questions # 34:

A cloud hosting provider is concerned about the potential risks associated with attacks that target the confidentiality and integrity of sensitive data stored on its servers’ volatile memory. The provider has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this provider?

Options:

A.

Implementing secure encrypted enclaves and AMD Secure Memory Encryption


B.

Enforcing a strong password complexity policy for all user accounts


C.

Implementing a next-generation antivirus system to detect and prevent malware attacks


D.

Conducting regular security awareness training for all employees


Expert Solution
Questions # 35:

A company recently updated its disaster recovery plan (DRP) to ensure business continuity in the event of a disruptive incident.

Which step will ensure the effectiveness of the DRP?

Options:

A.

Training employees on their roles and responsibilities during a disaster


B.

Performing a risk assessment of the company’s information assets


C.

Developing and implementing a testing plan for the DRP


D.

Reviewing and updating the DRP regularly to ensure it remains relevant


Expert Solution
Questions # 36:

During a vulnerability assessment, several end-of-life operating systems were discovered within the environment. Which action should be taken to resolve the issue?

Options:

A.

Disconnect the end-of-life machines


B.

Shutdown and remove the end-of-life machines


C.

Block the end-of-life machines


D.

Upgrade the remaining end-of-life machines


Expert Solution
Questions # 37:

A software development company is required to comply with the Payment Card Industry Data Security Standard (PCI DSS), which sets requirements for the protection of cardholder data. The company uses Secure Shell (SSH) to connect to its cloud-based development environment, which contains cardholder data.

Which security control will meet the needs of the company?

Options:

A.

Patch management


B.

Network segmentation


C.

Strong authentication


D.

Vulnerability analysis


Expert Solution
Questions # 38:

A financial institution conducted a cybersecurity assessment, which identified several vulnerabilities, including outdated software and weak password policies. The company also needs to implement a new core banking system that can handle a large number of transactions while ensuring the security of customer data.

Which risk mitigation process is the most effective approach to address these vulnerabilities, and what is the best topology for the new core banking system?

Options:

A.

Creating strong password policies and enforcing multifactor authentication and using public cloud topology


B.

Implementing security patches and updates on a regular basis and using hybrid cloud topology


C.

Installing antivirus software on all endpoints and using on-premise topology


D.

Conducting regular security audits and penetration testing and using private cloud topology


Expert Solution
Questions # 39:

An e-commerce company has recently experienced a data breach in which the personal and financial information of its customers was stolen. The company is concerned about the potential for future data breaches.

What is the most important factor to consider when evaluating the potential for future data breaches in this scenario?

Options:

A.

Impact


B.

Risk


C.

Threat actors


D.

Likelihood


Expert Solution
Questions # 40:

A company may choose to use CDs, DVDs, hard drives, or even cloud storage for data backup.

Which aspect of data backup does this statement describe?

Options:

A.

Data mirroring


B.

Incremental backups


C.

Image backups


D.

Backup media


Expert Solution
Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions