Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

WGU Cybersecurity-Architecture-and-Engineering - WGU Cybersecurity Architecture and Engineering (KFO1/D488)

During a vulnerability assessment, several end-of-life operating systems were discovered within the environment. Which action should be taken to resolve the issue?

A.

Disconnect the end-of-life machines

B.

Shutdown and remove the end-of-life machines

C.

Block the end-of-life machines

D.

Upgrade the remaining end-of-life machines

A government agency is required to comply with the Federal Information Security Modernization Act (FISMA), which establishes security requirements for federal information systems. The agency needs to secure its external network, which connects to the internet and is used by employees, contractors, and other authorized personnel.

Which security control will secure the external network and protect against unauthorized access?

A.

Intrusion detection and prevention

B.

Firewall

C.

Access controls

D.

Network segmentation

Which type of communications media uses light waves to transmit data?

A.

Fiber optic

B.

Radio towers

C.

Twisted pair

D.

Coaxial

A cloud service provider is concerned about the potential risks associated with hardware-based attacks on its virtual machines. The provider has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this provider?

A.

Conducting regular vulnerability assessments and penetration testing

B.

Disabling central processing unit (CPU) virtualization support

C.

Implementing a web application firewall to monitor incoming traffic

D.

Enforcing strict access control policies for all users

A healthcare provider is required to comply with the Health Insurance Portability and Accountability Act (HIPAA), which sets requirements for the protection of patient healthinformation. The provider uses various software applications to manage and store patient health information, which must be coded to protect its confidentiality and integrity.

Which protocol will meet the needs of this provider?

A.

Wired Equivalent Privacy (WEP)

B.

Advanced Encryption Standard (AES)

C.

Simple Mail Transfer Protocol (SMTP)

D.

Rivest-Shamir-Adleman (RSA)

Which block cipher mode of operation for encrypting data is simple and efficient but provides no confidentiality beyond that of the underlying block cipher?

A.

Counter (CTR)

B.

Electronic Codebook (ECB)

C.

Output Feedback (OFB)

D.

Cipher Block Chaining (CBC)

Which is true about access rights?

A.

They limit users to permitted items.

B.

They are part of the System Development Life Cycle.

C.

They require the use of a compiler.

D.

They are defined by the machine language.

The security team has been tasked with selecting a password complexity policy for the organization.

Which password complexity policy option should be recommended?

A.

Twelve characters with no symbols or numbers

B.

Sixteen characters with at least one letter, one number, and one symbol

C.

Four characters with at least one letter or one number

D.

Eight characters with no symbols or numbers

What are two differences between a handheld computer and a desktop?

Choose 2 answers.

A.

A handheld has more memory.

B.

A desktop has more memory.

C.

A desktop has more internal storage.

D.

A handheld has more internal storage.

Which risk management strategy will help defeat piracy efforts on a new patient management system?

A.

Configuration of the patient management system to disable all external device connections on all workstations

B.

Incorporation of end-to-end encryption for all patient data

C.

Implementation of regular virus scanning for all workstations

D.

Implementation of licensing technologies in order to restrict unauthorized access to the system