Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free WGU Cybersecurity-Architecture-and-Engineering Practice Exam with Questions & Answers | Set: 3

Questions 21

A security team has been informed that user data on the network has been compromised.

What is the first step the organization should take to respond to this data breach?

Options:
A.

Notify affected users of the incident

B.

Implement an access control policy

C.

Increase encryption levels

D.

Publicly announce the breach

WGU Cybersecurity-Architecture-and-Engineering Premium Access
Questions 22

What does the following SQL statement produce when executed?

SELECT ‘ FROM Customers

WHERE State = 'Arizona';

Options:
A.

All of the records from the Customers table

B.

All of the records from the Customers database

C.

All of the records from the Customers database that are located in Arizona

D.

All of the records from the Customers table that are located in Arizona

Questions 23

Which IT role is responsible for installing new hardware and troubleshooting existing hardware?

Options:
A.

Web administrator

B.

System administrator

C.

Security administrator

D.

Network administrator

Questions 24

A retail company wants to establish the frequency at which it needs to backup its critical data to ensure it can be restored in case of a disruption with the least amount of acceptable loss in recovery.

What is the term used to describe this metric?

Options:
A.

Continuous data protection (CDP)

B.

Business impact analysis (BIA)

C.

Disaster recovery (DR)

D.

Recovery point objective (RPO)

Questions 25

A company wants to secure its computer systems and prevent any unauthorized access to its network. The company wants to implement a security solution that can restrict network traffic to only approved services and applications.

Which security technology will meet the needs of this company?

Options:
A.

Antivirus tools

B.

Two-factor authentication

C.

Host-based firewall

D.

Hardware security module (HSM)

Questions 26

A company has recently implemented a hybrid cloud deployment. The security team has been notified about thousands of failed attempts to connect to routers and switches in the on-premises network. A solution must be implemented to block connections after three unsuccessful SSH attempts on any network device.

Options:
A.

Firewall

B.

Data Loss Prevention

C.

Intrusion Prevention System (IPS)

Questions 27

A professional services organization deployed security edge devices in key locations on its corporate network.

How will these devices improve the organization's security posture?

Options:
A.

They act as an initial defense layer for potential threats

B.

They protect from severe distributed denial-of-service (DDoS) attacks

C.

They act as a security information and event management (SIEM) module for a security operations center (SOC) analyst

D.

They are a set of trusted platform module (TPM) devices

Questions 28

A financial services company is concerned about the potential risks associated with sensitive customer data stored on employee laptops. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

Options:
A.

Restricting user permissions for laptop software installation

B.

Implementing biometric authentication for laptop log-ins

C.

Implementing local drive encryption on employee laptops

D.

Conducting regular security awareness training for employees

Questions 29

Which risk management strategy will supplement privacy requirements for data on an electronic health record (EHR) system?

Options:
A.

Configuration of the system to disable universal serial bus (USB) ports on all workstations

B.

Encryption of all network traffic between the EHR system and external networks

C.

Implementation of role-based access controls and encryption of all sensitive data

D.

Implementation of a strict firewall policy to restrict access to the system's server

Questions 30

What is an information system?

Options:
A.

The hardware that allows human-computer interactions

B.

A database utility from a third party

C.

The computer hardware components

D.

A collection of data to support an organization

WGU Related Exams

How to pass WGU Managing-Human-Capital - WGU Managing Human Capital C202 Exam
How to pass WGU Integrated-Physical-Sciences - WGU Integrated Physical Sciences (MTC1) Exam
How to pass WGU Organizational-Behaviors-and-Leadership - WGU Organizational Behaviors and Leadership (IBC1) Exam
How to pass WGU Principles-of-Management - Principles of Management at Western Governors University(IAC1) Exam
How to pass WGU Web-Development-Applications - WGU Web Development Applications (KVO1) Exam
How to pass WGU Ethics-In-Technology - WGU Ethics In TechnologyQCO1 Exam
How to pass WGU Information-Technology-Management - WGU Information Technology Management QGC1 Exam
How to pass WGU Secure-Software-Design - WGU Secure Software Design (D487) Exam Exam
How to pass WGU Network-and-Security-Foundation - Network-and-Security-Foundation Exam
How to pass WGU Data-Management-Foundations - WGU Data Management – Foundations Exam Exam
How to pass WGU Cloud-Deployment-and-Operations - WGUCloud Deployment and Operations Exam

WGU Free Exams

WGU Free Exams
Examstrack offers comprehensive free resources and practice tests for WGU exams.