Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

WGU Cybersecurity-Architecture-and-Engineering - WGU Cybersecurity Architecture and Engineering (KFO1/D488)

Which stream cipher is a variant of the Salsa20 cipher, designed to be fast, secure, and resistant to cryptanalysis, and is commonly used in combination with the Poly1305 authentication mode?

A.

ChaCha

B.

Cipher Block Chaining (CBC)

C.

Counter (CTR)

D.

Electronic Codebook (ECB)

A software development company is concerned about the potential risks associated with exploits that target vulnerabilities in the Linux operating system used by the company’s servers. Thecompany has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

A.

Enforcing strict access control policies for all users

B.

Implementing a host-based intrusion detection and prevention system

C.

Conducting regular security assessments and penetration testing

D.

Implementing shell restrictions

An organization is experiencing multiple instances of attempted access from geographicallocations where there are no corporate offices or staff.

What should a network administrator do to prevent further access attempts?

A.

Adjust the rule sets within the Security Information and Event Manager (SIEM) tool

B.

Adjust the Domain Name Service (DNS) server A Records

C.

Adjust the main proxy server to only allow specific addresses

D.

Adjust the firewall configuration to drop traffic from these addresses

A retail company has recently implemented a new point of sale (POS) system that is critical to its business.

Which security control is essential for protecting the availability of the POS system?

A.

Implementing intrusion detection and prevention systems can help detect and prevent unauthorized access to the POS system.

B.

Regularly backing up the data stored in the POS system and having a disaster recovery plan can help ensure that the system is available in the event of a security incident or system failure.

C.

Enforcing strict access controls can limit the number of users with access to the POS system and prevent unauthorized access.

D.

Regularly updating the POS system with the latest security patches can help prevent exploitation of known vulnerabilities and maintain the system's availability.

A company wants to ensure that the integrity of its systems is maintained during the startup process.

Which security technology can ensure the integrity of the system during startup by verifying that the system has not been compromised?

A.

Two-factor authentication

B.

Intrusion detection system (IDS)

C.

Hardware security module (HSM)

D.

Measured boot

An IT organization has seen a surge of ransomware and Trojan horse attacks recently.

Which action should the security team recommend to protect the IT infrastructure from commodity malware threats?

A.

Installing a firewall to identify malicious traffic

B.

Rerouting suspicious communications to a remote machine

C.

Implementing a two-factor authentication system

D.

Installing endpoint protection software

After a recent security assessment, it was discovered that many company devices have unnecessary ports opened to the network.

What should the company configure to fix this?

A.

Intrusion prevention system

B.

Web application firewall

C.

Device hardening

D.

Intrusion detection system

In which state is data considered information?

A.

Raw

B.

Input

C.

Unprocessed

D.

Processed

Which action should an IT department take if an organization decides to expand its business by selling products online?

A.

Make sure the website can handle e-commerce transactions

B.

Ensure that the strategic goals aligned with the organization's mission statement

C.

Market the company’s products or services

D.

Manage capital to ensure a successful website

An organization wants to ensure that its website is free of certain vulnerabilities before the final hand-off to the client.

What testing method should the organization use to inspect traffic to detect potential issues?

A.

Bastion scanner

B.

Port scanner

C.

HTTP interceptor

D.

Domain interceptor