Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

WGU Cybersecurity-Architecture-and-Engineering - WGU Cybersecurity Architecture and Engineering (KFO1/D488)

Which part of the Uniform Resource Locator (URL) identifies the server on which the web page can be found?

A.

Resource path ID

B.

Domain name

C.

Protocol

D.

IP address

A retail company wants to establish the frequency at which it needs to backup its critical data to ensure it can be restored in case of a disruption with the least amount of acceptable loss in recovery.

What is the term used to describe this metric?

A.

Continuous data protection (CDP)

B.

Business impact analysis (BIA)

C.

Disaster recovery (DR)

D.

Recovery point objective (RPO)

A professional services organization deployed security edge devices in key locations on its corporate network.

How will these devices improve the organization's security posture?

A.

They act as an initial defense layer for potential threats

B.

They protect from severe distributed denial-of-service (DDoS) attacks

C.

They act as a security information and event management (SIEM) module for a security operations center (SOC) analyst

D.

They are a set of trusted platform module (TPM) devices

Which life cycle is part of the process for planning, creating, testing, and deploying information systems?

A.

Network Development Life Cycle (NDLC)

B.

System Development Life Cycle (SDLC)

C.

Database Creation System Life Cycle (DCSLC)

D.

Software Test Life Cycle (STLC)

What allows a user to query information from an online database with a web application without revealing what they are viewing?

A.

Private Information Retrieval (PIR)

B.

Homomorphic encryption

C.

Secure Function Evaluation (SFE)

D.

Private Function Evaluation (PFE)

An e-learning company uses Amazon Simple Storage Service (Amazon S3) to store e-books and video files that are served to customers through a custom application. The company has realized that someone has been stealing its intellectual property. Which threat actor is most likely in this scenario?

A.

Competitor

B.

Hacktivist

C.

Advanced Persistent Threat

D.

Novice hacker

Which security technique should be used to prevent data exfiltration?

A.

Intrusion Detection Software (IDS)

B.

Data Loss Prevention (DLP)

C.

Multi-Factor Authentication (MFA)

D.

Intrusion Prevention Software (IPS)

What is the correct order of project phases?

A.

1)Initiation2)Executing3)Planning4)Monitoring and Controllings) Closing

B.

1) Planning2) InitiationAMonitoring and Controlling4) Executings) Closing

C.

1) Executing2) Monitoring and Controlling3) Initiation4) Planning5) Closing

D.

1) Initiation2) Planning° 3) Executing4) Monitoring and Controllings) Closing

Which encryption technique can be used to enable a third-party provider to perform calculations on encrypted data without decrypting the data?

A.

Homomorphic encryption

B.

Secure function evaluation (SFE)

C.

Secure Sockets Layer (SSL)

D.

Private information retrieval (PIR)

A company is developing a new system to process personal information about its customers, including their names, addresses, and purchase histories.

Which term describes the process of identifying and evaluating the potential effects that the new system may have on the privacy of personal information and developing strategies to mitigate those risks?

A.

Disaster recovery (DR)

B.

Business continuity planning (BCP)

C.

Data Protection Impact Assessment (DPIA)

D.

Risk management