Pass the WGU Courses and Certificates Cybersecurity-Architecture-and-Engineering Questions and answers with CertsForce

Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions
Questions # 51:

An on-call security engineer has been notified after business hours that a possible threat could be impacting production applications.

Which type of threat intelligence should be used by first responders?

Options:

A.

Tactical


B.

Commodity malware


C.

Operational


D.

Strategic


Expert Solution
Questions # 52:

A company is concerned about advanced persistent threats and wants to implement a security solution that can detect any unusual actions. The company wants to analyze the actions and trends of users and entities to identify any potential security risks.

Which security technology meets the needs of the company?

Options:

A.

User and entity behavior analytics (UEBA)


B.

Hardware security module (HSM)


C.

Antivirus tools


D.

Two-factor authentication


Expert Solution
Questions # 53:

Which type of systems testing includes having end users test the system with simulated data and the help of the developer?

Options:

A.

User Acceptance


B.

Beta


C.

Alpha


D.

Analysis


Expert Solution
Questions # 54:

A company is concerned about the potential risks associated with unauthorized modifications to the basic input/output system (BIOS) firmware on its servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which technique will prevent unauthorized modifications to the BIOS firmware on a server?

Options:

A.

BIOS monitoring


B.

Using an intrusion detection system to detect and prevent attacks


C.

Conducting regular backups of the server's data


D.

BIOS protection


Expert Solution
Questions # 55:

A security team is investigating multiple man-in-the-middle attacks that have taken place on the corporate network over the past few months. The team needs a solution that will ensure that data is not exposed if a man-in-the-middle attack occurs in the future.

What is the best solution?

Options:

A.

Disabling Wi-Fi connections


B.

Enforcing password history


C.

Encrypting data


D.

Ensuring all users have complex passwords


Expert Solution
Questions # 56:

A software company is reviewing its disaster recovery plan and wants to identify the criticality of its business processes to prioritize its recovery efforts.

Which will determine the criticality of its business processes?

Options:

A.

Business continuity planning (BCP)


B.

Business impact analysis (BIA)


C.

Disaster recovery (DR)


D.

Incident response (IR)


Expert Solution
Questions # 57:

How should a security analyst detect a potential structured query language (SQL) injection attack?

Options:

A.

By looking for extra and unexpected symbols and characters in certain queries


B.

By looking for database primary key changes on the production environment


C.

By looking for repeated failed login attempts to the database server


D.

By looking for administrative command attempts within database log files


Expert Solution
Questions # 58:

An employee needs to execute a program from the command line.

Which peripheral device should be used?

Options:

A.

Keyboard


B.

Hard drive


C.

Speaker


D.

Printer


Expert Solution
Questions # 59:

An IT organization needs to enable secure communication across virtual networks in Microsoft Azure and Amazon Web Services. Which protocol will offer the most reliable and secure method for data transport?

Options:

A.

File Transfer Protocol (FTP)


B.

Secure Shell (SSH)


C.

Internet Protocol Security (IPsec)


Expert Solution
Questions # 60:

A healthcare provider is required to comply with the Health Insurance Portability and Accountability Act (HIPAA), which sets requirements for the protection of patient healthinformation. The provider uses various software applications to manage and store patient health information, which must be coded to protect its confidentiality and integrity.

Which protocol will meet the needs of this provider?

Options:

A.

Wired Equivalent Privacy (WEP)


B.

Advanced Encryption Standard (AES)


C.

Simple Mail Transfer Protocol (SMTP)


D.

Rivest-Shamir-Adleman (RSA)


Expert Solution
Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions