Pass the WGU Courses and Certificates Cybersecurity-Architecture-and-Engineering Questions and answers with CertsForce

Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions
Questions # 41:

Management has asked its networking team to recommend a solution for direct communication between multiple virtual networks in the cloud. The solution must utilize the least amount of administrative effort.

Which solution meets the requirements?

Options:

A.

Virtual network peering


B.

Virtual local area network


C.

Remote Desktop Protocol


D.

Domain name system


Expert Solution
Questions # 42:

What are three operating systems that are commonly used today?

Choose 3 answers

Options:

A.

Microsoft Outlook


B.

Mac OS


C.

Linux


D.

MySQL


E.

Microsoft Windows


F.

Mozilla Firefox


Expert Solution
Questions # 43:

A software development company is concerned about the potential risks associated with exploits that target vulnerabilities in the Linux operating system used by the company's servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

Options:

A.

Implementing a host-based intrusion detection and prevention system


B.

Enforcing strict access control policies for all users


C.

Implementing shell restrictions


D.

Conducting regular security assessments and penetration testing


Expert Solution
Questions # 44:

During a vulnerability assessment, several end-of-life operating systems were discovered within the environment.

Which action should be taken to resolve the issue?

Options:

A.

Shut down and remove the end-of-life machines


B.

Disconnect the end-of-life machines


C.

Block the end-of-life machines


D.

Upgrade the remaining end-of-life machines


Expert Solution
Questions # 45:

A government agency is required to comply with the Federal Information Security Modernization Act (FISMA), which establishes security requirements for federal information systems. The agency needs to secure its external network, which connects to the internet and is used by employees, contractors, and other authorized personnel.

Which security control will secure the external network and protect against unauthorized access?

Options:

A.

Intrusion detection and prevention


B.

Firewall


C.

Access controls


D.

Network segmentation


Expert Solution
Questions # 46:

A company wants to secure its computer systems and prevent any unauthorized access to its network. The company wants to implement a security solution that can restrict network traffic to only approved services and applications.

Which security technology will meet the needs of this company?

Options:

A.

Antivirus tools


B.

Two-factor authentication


C.

Host-based firewall


D.

Hardware security module (HSM)


Expert Solution
Questions # 47:

Which action should an IT department take if an organization decides to expand its business by selling products online?

Options:

A.

Make sure the website can handle e-commerce transactions


B.

Ensure that the strategic goals aligned with the organization's mission statement


C.

Market the company’s products or services


D.

Manage capital to ensure a successful website


Expert Solution
Questions # 48:

A company has recently implemented a hybrid cloud deployment. The security team has been notified about thousands of failed attempts to connect to routers and switches in the on-premises network. A solution must be implemented to block connections after three unsuccessful SSH attempts on any network device.

Which solution meets the requirements in this scenario?

Options:

A.

Data loss prevention


B.

Firewall


C.

Intrusion prevention system


D.

File integrity monitoring


Expert Solution
Questions # 49:

The security team has been notified about multiple man-in-the-middle (MITM) attacks happening on the wireless network over the past thirty days. Management has agreed to upgrade the network infrastructure to help eliminate these attacks.

Which solution fulfills these requirements?

Options:

A.

Security information and event management (SIEM)


B.

Wireless intrusion prevention system (WIPS)


C.

Inline network encryptor


D.

Layer 3 switch


Expert Solution
Questions # 50:

Which technique allows someone to obtain a password while it is in transit?

Options:

A.

Packet sniffing


B.

Buffer overflow


C.

Phishing


D.

Black hat


Expert Solution
Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions