WGU Cybersecurity-Architecture-and-Engineering - WGU Cybersecurity Architecture and Engineering (KFO1/D488)
Total 232 questions
Which part of the Uniform Resource Locator (URL) identifies the server on which the web page can be found?
A retail company wants to establish the frequency at which it needs to backup its critical data to ensure it can be restored in case of a disruption with the least amount of acceptable loss in recovery.
What is the term used to describe this metric?
A professional services organization deployed security edge devices in key locations on its corporate network.
How will these devices improve the organization's security posture?
Which life cycle is part of the process for planning, creating, testing, and deploying information systems?
What allows a user to query information from an online database with a web application without revealing what they are viewing?
An e-learning company uses Amazon Simple Storage Service (Amazon S3) to store e-books and video files that are served to customers through a custom application. The company has realized that someone has been stealing its intellectual property. Which threat actor is most likely in this scenario?
Which security technique should be used to prevent data exfiltration?
What is the correct order of project phases?
Which encryption technique can be used to enable a third-party provider to perform calculations on encrypted data without decrypting the data?
A company is developing a new system to process personal information about its customers, including their names, addresses, and purchase histories.
Which term describes the process of identifying and evaluating the potential effects that the new system may have on the privacy of personal information and developing strategies to mitigate those risks?