Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

WGU Cybersecurity-Architecture-and-Engineering - WGU Cybersecurity Architecture and Engineering (KFO1/D488)

A company recently updated its disaster recovery plan (DRP) to ensure business continuity in the event of a disruptive incident.

Which step will ensure the effectiveness of the DRP?

A.

Training employees on their roles and responsibilities during a disaster

B.

Performing a risk assessment of the company’s information assets

C.

Developing and implementing a testing plan for the DRP

D.

Reviewing and updating the DRP regularly to ensure it remains relevant

A company has recently implemented a hybrid cloud deployment. The security team has been notified about thousands of failed attempts to connect to routers and switches in the on-premises network. A solution must be implemented to block connections after three unsuccessful SSH attempts on any network device.

A.

Firewall

B.

Data Loss Prevention

C.

Intrusion Prevention System (IPS)

How does application software differ from operating systems?

Choose 2 answers

A.

Application software includes system utilities that run on demand of the user.

B.

Application software consists of programs that end users run to accomplish business or personal tasks, such as e-mail.

C.

Application software includes word processors and spreadsheet software that are useful to end users.

D.

Application software supports the computer hardware system directly.

A healthcare provider is developing a disaster recovery plan and wants to determine the longest duration that its systems or applications can be down before causing significant damage to the business.

What is the term used to describe this metric?

A.

Recovery time objective (RTO)

B.

Business impact analysis (BIA)

C.

Business continuity planning (BCP)

D.

Disaster recovery (DR)

A software development company is concerned about the potential risks associated with exploits that target vulnerabilities in the Linux operating system used by the company's servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

A.

Implementing a host-based intrusion detection and prevention system

B.

Enforcing strict access control policies for all users

C.

Implementing shell restrictions

D.

Conducting regular security assessments and penetration testing

Which peripheral replaces the mouse on a mobile device?

A.

Stylus

B.

Jack

C.

Camera

D.

USB

A retail company wants to establish the frequency at which it needs to back up its critical data to ensure it can be restored in case of a disruption with the least amount of acceptable data loss.

What is the term used to describe this metric?

A.

Business Impact Analysis (BIA)

B.

Continuous Data Protection (CDP)

C.

Recovery Point Objective (RPO)

D.

Disaster Recovery (DR)

During a vulnerability assessment, several end-of-life operating systems were discovered within the environment.

Which action should be taken to resolve the issue?

A.

Shut down and remove the end-of-life machines

B.

Disconnect the end-of-life machines

C.

Block the end-of-life machines

D.

Upgrade the remaining end-of-life machines

A professional services organization deployed security edge devices in key locations on its corporate network.

How will these devices improve the organization’s security posture?

A.

They act as an initial defense layer for potential threats

B.

They are a set of Trusted Platform Module (TPM) devices

C.

They protect from severe Distributed Denial-of-Service (DDoS) attacks

D.

They act as a Security Information and Event Management (SIEM) module for a SOC analyst

A financial institution is concerned about a potential data breach due to employees accessing the company network using personal devices. They have decided to implement a bring your own device (BYOD) policy to mitigate the risk.

Which risk mitigation strategy will reduce the risk of a data breach in this scenario?

A.

Blocking access to the company network from personal devices

B.

Conducting regular security audits of the company network

C.

Implementing a mobile device management (MDM) solution

D.

Providing security awareness training for employees