Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free WGU Cybersecurity-Architecture-and-Engineering Practice Exam with Questions & Answers | Set: 2

Questions 11

Which type of systems testing includes having end users test the system with simulated data and the help of the developer?

Options:
A.

User Acceptance

B.

Beta

C.

Alpha

D.

Analysis

WGU Cybersecurity-Architecture-and-Engineering Premium Access
Questions 12

Which risk management strategy will ensure the secure configuration and deployment of a new online banking system and help prevent credit card fraud?

Options:
A.

Implementation of real-time transaction monitoring

B.

Implementation of a strict firewall policy to restrict access to the system's server

C.

Configuration of the system to disable all email services on all workstations

D.

Use of regular system backups to an off-site location

Questions 13

What type of a system requirement involves preventing unauthorized access to data?

Options:
A.

Accessibility

B.

Design

C.

User needs

D.

Security

Questions 14

What does the following SQL statement produce when executed?

SELECT ‘ FROM Customers

WHERE State = ’Arizona';

Options:
A.

All of the records from the Customers table

B.

All of the records from the Customers database

C.

All of the records from the Customers database that are located in Arizona

D.

All of the records from the Customers table that are located in Arizona

Questions 15

A government agency is required to comply with the Federal Information Security Modernization Act (FISMA), which establishes security requirements for federal information systems. The agency needs to secure its external network, which connects to the internet and is used by employees, contractors, and other authorized personnel.

Which security control will secure the external network and protect against unauthorized access?

Options:
A.

Intrusion detection and prevention

B.

Firewall

C.

Access controls

D.

Network segmentation

Questions 16

A project manager is working on a project that involves securing the network of a tall building. The manager is tasked with managing these risks effectively to ensure the successful completion of the project within a given time frame and budget. The manager identified multiple potential risks associated with the project.

What is the next step in the risk management life cycle?

Options:
A.

Identify

B.

Review

C.

Assess

D.

Control

Questions 17

What is the typical organizing principle of a database?

Options:
A.

Selective

B.

Projection

C.

Relational

D.

Modular

Questions 18

An e-learning company uses Amazon Simple Storage Service (Amazon S3) to store e-books and video files that are served to customers through a custom application. The company has realized that someone has been stealing its intellectual property. Which threat actor is most likely in this scenario?

Options:
A.

Competitor

B.

Hacktivist

C.

Advanced Persistent Threat

D.

Novice hacker

Questions 19

An IT organization has recently implemented a hybrid cloud deployment. The server team is deploying a new set of domain-joined Windows servers on cloud-based virtual machines. Users must be able to use their Active Directory credentials to sign in to applications regardless of whether they are running on Windows servers in the cloud or on-premises.

Which solution should be implemented to meet the requirements?

Options:
A.

Two-step verification

B.

Challenge-Handshake Authentication Protocol (CHAP)

C.

Privileged identity management

D.

Identity federation

Questions 20

A company has discovered a vulnerability in its Domain Name System (DNS) that could allow attackers to redirect users to malicious websites. The company has decided to implement a risk management strategy to mitigate this vulnerability.

What is the most effective risk management strategy for this vulnerability?

Options:
A.

Increasing the frequency of DNS server patching

B.

Conducting regular security awareness training for employees on the risks of phishing attacks

C.

Implementing Domain Name System Security Extensions (DNSSEC) to digitally sign DNS responses and prevent DNS spoofing attacks

D.

Restricting DNS access to trusted Internet Protocol (IP) addresses only

WGU Related Exams

How to pass WGU Managing-Human-Capital - WGU Managing Human Capital C202 Exam
How to pass WGU Integrated-Physical-Sciences - WGU Integrated Physical Sciences (MTC1) Exam
How to pass WGU Organizational-Behaviors-and-Leadership - WGU Organizational Behaviors and Leadership (IBC1) Exam
How to pass WGU Principles-of-Management - Principles of Management at Western Governors University(IAC1) Exam
How to pass WGU Web-Development-Applications - WGU Web Development Applications (KVO1) Exam
How to pass WGU Ethics-In-Technology - WGU Ethics In TechnologyQCO1 Exam
How to pass WGU Information-Technology-Management - WGU Information Technology Management QGC1 Exam
How to pass WGU Secure-Software-Design - WGU Secure Software Design (D487) Exam Exam
How to pass WGU Network-and-Security-Foundation - Network-and-Security-Foundation Exam
How to pass WGU Data-Management-Foundations - WGU Data Management – Foundations Exam Exam
How to pass WGU Cloud-Deployment-and-Operations - WGUCloud Deployment and Operations Exam

WGU Free Exams

WGU Free Exams
Examstrack offers comprehensive free resources and practice tests for WGU exams.