Pass the WGU Courses and Certificates Cybersecurity-Architecture-and-Engineering Questions and answers with CertsForce

Viewing page 7 out of 7 pages
Viewing questions 61-70 out of questions
Questions # 61:

A retail company wants to establish the frequency at which it needs to backup its critical data to ensure it can be restored in case of a disruption with the least amount of acceptable loss in recovery.

What is the term used to describe this metric?

Options:

A.

Continuous data protection (CDP)


B.

Business impact analysis (BIA)


C.

Disaster recovery (DR)


D.

Recovery point objective (RPO)


Expert Solution
Questions # 62:

An IT organization recently implemented a hybrid cloud deployment. The security team must be able to correlate event data combined from different sources in a central location.

Options:

A.

Intrusion Detection System (IDS)


B.

File Integrity Monitoring (FIM)


C.

Security Information and Event Management (SIEM)


D.

Data Loss Prevention (DLP)


Expert Solution
Questions # 63:

Which system conversion method deploys the new system while the old system is still operational in order to compare output?

Options:

A.

Phased


B.

Direct


C.

Parallel


D.

Pilot


Expert Solution
Questions # 64:

Which protocol can be used to provide secure email communication and ensure the confidentiality, integrity, and authenticity of email messages?

Options:

A.

Simple Mail Transfer Protocol (SMTP)


B.

Pretty Good Privacy (PGP)


C.

Secure/Multipurpose Internet Mail Extensions (S/MIME)


D.

Internet Protocol Security (IPsec)


Expert Solution
Questions # 65:

An IT organization has recently implemented a hybrid cloud deployment. The server team is deploying a new set of domain-joined Windows servers on cloud-based virtual machines. Users must be able to use their Active Directory credentials to sign in to applications regardless of whether they are running on Windows servers in the cloud or on-premises.

Options:

A.

Identity federation


B.

Privileged identity management


C.

Challenge-Handshake Authentication Protocol (CHAP)


D.

Two-step verification


Expert Solution
Questions # 66:

A company is looking to monitor and detect any suspicious activity on its servers. The company wants to implement a security solution that can detect any unauthorized access or unusual activity on the servers.

Which security technology will meet the needs of this company?

Options:

A.

Hardware security module (HSM)


B.

Two-factor authentication


C.

Antivirus tools


D.

Host-based intrusion detection system (HIDS)


Expert Solution
Questions # 67:

A system analyst is reviewing risk documents and noticed that the date of many risks are more than three years old.

What should be proposed to leadership regarding these risks?

Options:

A.

A process to reassess risks on a defined schedule


B.

A process to confirm that risk documents are readily available to all individuals


C.

A process to evaluate how risks are captured on risk documents


D.

A process to determine how involved leadership is in assignment risk scores


Expert Solution
Questions # 68:

A professional services organization deployed security edge devices in key locations on its corporate network.

How will these devices improve the organization’s security posture?

Options:

A.

They act as an initial defense layer for potential threats


B.

They are a set of Trusted Platform Module (TPM) devices


C.

They protect from severe Distributed Denial-of-Service (DDoS) attacks


D.

They act as a Security Information and Event Management (SIEM) module for a SOC analyst


Expert Solution
Questions # 69:

What is a common characteristic of a proprietary software license?

Options:

A.

A business gains the right to modify the software's source code.


B.

A business gains the right to use the software.


C.

A business gains the right to own the software.


D.

A business gains the right to distribute the software freely.


Expert Solution
Viewing page 7 out of 7 pages
Viewing questions 61-70 out of questions