Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

WGU Cybersecurity-Architecture-and-Engineering - WGU Cybersecurity Architecture and Engineering (KFO1/D488)

A corporate website is currently being redesigned, which leaves it vulnerable to security threats. Management does not want to provide an attacker with any information about the web server. Which strategy should be used to prevent an attacker from gaining unauthorized information?

A.

Obfuscating error messages on the site or within the Uniform Resource Locator (URL)

B.

Enabling Hypertext Transfer Protocol Secure (HTTPS) over Domain Name Service (DNS)

C.

Using HTTPS for all page and content requests

D.

Becoming PCI-DSS compliant and certified

A healthcare provider is developing a disaster recovery plan and wants to determine the longest duration that its systems or applications can be down before causing significant damage to the business.

What is the term used to describe this metric?

A.

Business Continuity Planning (BCP)

B.

Recovery Time Objective (RTO)

C.

Business Impact Analysis (BIA)

D.

Disaster Recovery (DR)

An organization wants to implement a new encryption solution for a real-time video conferencing application. The organization wants to ensure that the encryption solution provides protection for the video stream without causing significant delays or latency in the conference.

Which type of encryption will meet the needs of the organization?

A.

Block ciphers

B.

Asymmetric encryption

C.

Stream ciphers

D.

Hash functions

Which motherboard component is used for short-term storage of data?

A.

Hard Drive

B.

BIOS

C.

Read Only Memory

D.

RAM

Which risk management strategy will help prevent cheating using a learning management system as a platform?

A.

Enforcement of a strict firewall policy to restrict access to the system's server

B.

Configuration of the system to disable all Bluetooth services on all workstations

C.

Implementation of secure user authentication protocols

D.

Implementation of regular software updates and patch management

What is the role of the CPU in a computing environment?

Choose 2 answers

A.

Carrying out the instructions of a computer program

B.

Storing data as it is being processed

C.

Directing electrical current over the circuit board

D.

Connecting components to the system unit

E.

Containing an arithmetic logic unit (ALU) that performs arithmetic and logic operations

An IT team must allow on-premises users to log in to the Azure portal using their corporate credentials.

Which strategy should be used to enable identity federation in this scenario?

A.

Encrypting with Transport Layer Security (TLS)

B.

Deploying a hardware-based two-factor authentication (2FA) solution

C.

Integrating with lightweight directory access protocol (LDAP)

D.

Configuring third-party authentication with Security Assertion Markup Language (SAML)

What type of a system requirement involves preventing unauthorized access to data?

A.

Accessibility

B.

Design

C.

User needs

D.

Security

A cloud hosting provider is concerned about the potential risks associated with attacks that target the confidentiality and integrity of sensitive data stored on its servers' volatile storage. The provider has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this provider?

A.

Implementing secure encrypted enclaves and Advanced Micro Devices (AMD) Secure Memory Encryption

B.

Conducting regular security awareness training for all employees

C.

Implementing a next-generation antivirus system to detect and prevent malware attacks

D.

Enforcing a strong password complexity policy for all user accounts

An IT team has been tasked with improving the security of a company’s web applications.

Which threats should the IT team consider detecting when defending the network with a web application firewall (WAF)?

A.

Phishing attacks

B.

Brute force attacks

C.

Structured Query Language (SQL) injection attacks

D.

Social engineering attacks