Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

WGU Cybersecurity-Architecture-and-Engineering - WGU Cybersecurity Architecture and Engineering (KFO1/D488)

A healthcare organization is concerned about the potential risks associated with unauthorized access to sensitive patient information on its endpoint devices. The organization has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this organization?

A.

Enforcing strict password policies for all user accounts

B.

Conducting regular vulnerability assessments and penetration testing

C.

Implementing a network-based intrusion detection and prevention system

D.

Logging and monitoring endpoint devices

A large technology company has discovered a known vulnerability in its network infrastructure.The infrastructure contains a number of retired assets that are no longer receiving security updates, which could potentially be exploited by attackers to compromise the network. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

A.

Conducting regular vulnerability scans to identify potential weaknesses

B.

Implementing intrusion detection and prevention systems (IDPS)

C.

Enforcing strict access control policies for all network devices

D.

Removing all end-of-life devices from the network

What is a function of a compiler?

A.

It translates a source code and creates an executable program that may be run at a later time.

B.

It takes the most recent instruction and translates it as machine language.

C.

It takes a program written in a high-level language and converts it to a different high-level language program.

D.

It gathers together multiple executable programs and translates them into a readable format.

A company is developing a new system to process personal information about its customers, including their names, addresses, and purchase histories.

Which term describes the process of identifying and evaluating the potential effects that the new system may have on the privacy of personal information and developing strategies to mitigate those risks?

A.

Data Protection Impact Assessment (DPIA)

B.

Business Continuity Planning (BCP)

C.

Risk Management

D.

Disaster Recovery (DR)

After implementing a risk management plan for a new product launch, a project team conductedregular risk assessments to monitor the effectiveness of their control strategies.

Which step of the risk management life cycle was performed?

A.

Control

B.

Assess

C.

Identify

D.

Review

A company has recently experienced a data breach in which customer information was stolen. The company is concerned about the potential for future data breaches. A review of the incident revealed that the breach originated from stolen credentials.

Which security measure will meet the needs of this company?

A.

Implementing two-factor authentication

B.

Conducting background checks on employees

C.

Providing regular security awareness training to employees

D.

Installing a security information and event management (SIEM) system

While undergoing a security audit, it is determined that an organization has several backup repositories hosted in the cloud without any level of protection.

Which action should be taken to protect the backup repositories first?

A.

Audit access logs

B.

Run a vulnerability scan

C.

Restrict access to the backups

D.

Disable the backup repositories

A healthcare organization has experienced a ransomware attack that has resulted in the encryption of all patient medical records. The organization has backups, but restoring the data will take severaldays, and during that time, patient care will be significantly diminished.

What is the most important factor to consider when evaluating the severity of the ransomware attack?

A.

Threat actors

B.

Risk

C.

Impact

D.

Likelihood

A consultancy organization has many employees who travel with different mobile devices. Having the employees visit an office to update their devices is not feasible due to their travel schedule.

How should the organization ensure that its employees receive the latest security updates?

A.

By providing remote module updates

B.

By providing tokenized container updates

C.

By providing mobile station updates

D.

By providing over-the-air updates

An on-call security engineer has been notified after business hours that a possible threat could be impacting production applications.

Which type of threat intelligence should be used by first responders?

A.

Tactical

B.

Commodity malware

C.

Operational

D.

Strategic