WGU Cybersecurity-Architecture-and-Engineering - WGU Cybersecurity Architecture and Engineering (KFO1/D488)
Total 232 questions
During a vulnerability assessment, several end-of-life operating systems were discovered within the environment. Which action should be taken to resolve the issue?
A government agency is required to comply with the Federal Information Security Modernization Act (FISMA), which establishes security requirements for federal information systems. The agency needs to secure its external network, which connects to the internet and is used by employees, contractors, and other authorized personnel.
Which security control will secure the external network and protect against unauthorized access?
Which type of communications media uses light waves to transmit data?
A cloud service provider is concerned about the potential risks associated with hardware-based attacks on its virtual machines. The provider has decided to implement hardening techniques and endpoint security controls to mitigate the risk.
Which hardening technique will meet the needs of this provider?
A healthcare provider is required to comply with the Health Insurance Portability and Accountability Act (HIPAA), which sets requirements for the protection of patient healthinformation. The provider uses various software applications to manage and store patient health information, which must be coded to protect its confidentiality and integrity.
Which protocol will meet the needs of this provider?
Which block cipher mode of operation for encrypting data is simple and efficient but provides no confidentiality beyond that of the underlying block cipher?
Which is true about access rights?
The security team has been tasked with selecting a password complexity policy for the organization.
Which password complexity policy option should be recommended?
What are two differences between a handheld computer and a desktop?
Choose 2 answers.
Which risk management strategy will help defeat piracy efforts on a new patient management system?