Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

WGU Cybersecurity-Architecture-and-Engineering - WGU Cybersecurity Architecture and Engineering (KFO1/D488)

A security team is investigating multiple man-in-the-middle attacks that have taken place on the corporate network over the past few months. The team needs a solution that will ensure that data is not exposed if a man-in-the-middle attack occurs in the future.

What is the best solution?

A.

Disabling Wi-Fi connections

B.

Enforcing password history

C.

Encrypting data

D.

Ensuring all users have complex passwords

An insurance agency is concerned that some employees could be mishandling funds and covering it up. The agency wants to temporarily block these employees from working and ensure that operations continue.

Which strategy should the agency implement?

A.

Separation of duties

B.

Mandatory vacation

C.

Job rotation

D.

Least privilege

An organization sends customers e-mail messages based on their purchase patterns.

Which characteristic of quality data does this represent?

A.

Relevant

B.

Timely

C.

Thorough

D.

Accurate

A company has discovered a vulnerability in its lightweight directory access protocol (LDAP) implementation, which could potentially allow unauthorized access to sensitive information. The company has decided to implement risk mitigation strategies to reduce the risk associated with this vulnerability.

Which risk mitigation strategy will meet the needs of the company?

A.

Conducting regular security awareness training for employees to prevent social engineering attacks targeting LDAP credentials

B.

Regularly backing up data stored in the LDAP server to prevent data loss in the event of a breach

C.

Implementing intrusion detection and prevention systems (IDPS) to monitor for suspicious activities and potential LDAP attacks

D.

Implementing strong authentication mechanisms and encryption protocols to secure communication between the LDAP server and clients

Why is business continuity planning essential?

A.

It ensures that the company will be profitable.

B.

It ensures that the company will avoid asset loss.

C.

It allows for succession planning.

D.

It allows for the quickest return to business operations.

A large multinational corporation maintains a complex network of data centers across the world.

Which type of disaster recovery site will ensure business continuity in case of a disaster?

A.

A mobile data center that can be deployed to the disaster zone

B.

A fully equipped hot site with up-to-date hardware and software

C.

A secondary location with basic backup hardware and software

D.

A remote location with cloud-based backups

A security analyst for a financial institution is in the process of planning to upgrade the institution’s IT infrastructure to meet current industry standards. There are various potential risks associated with the upgrade, including data breaches, system outages, and cost overruns. The analyst is tasked with managing these risks to ensure a successful upgrade.

What is the first step in the risk management life cycle in this scenario?

A.

Assess

B.

Control

C.

Review

D.

Identify

An organization's engineering team is developing a mobile application that uses near-field communication (NFC) capabilities but wants to ensure that information communicated using this protocol remains confidential.

A.

Kerberos centralized server for token and certificate management

B.

Bluetooth device honing restrictions for increased-risk transactions

C.

Portable device management (PDM) to allow only authorized protocols

D.

Encryption to prevent man-in-the-middle and eavesdropping attacks

What is a characteristic of algorithms?

A.

No starting or stopping point

B.

Random instructions

C.

Unambiguous rules

D.

Constantly changing