Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free WGU Cybersecurity-Architecture-and-Engineering Practice Exam with Questions & Answers | Set: 4

Questions 31

How do data support an organization's business goals?

Options:
A.

Data create opportunities to compete for potential customers.

B.

Data can be manipulated to support desired outcomes.

C.

Data provide information for business decisions.

D.

Data ensure an organization's business goals are met.

WGU Cybersecurity-Architecture-and-Engineering Premium Access
Questions 32

A security team is investigating multiple man-in-the-middle (MITM) attacks that have taken place on the corporate network over the past few months. The team needs a solution that will ensure that data is not exposed if a man-in-the-middle attack occurs in the future.

Options:
A.

Enforcing password history

B.

Encrypting data

C.

Ensuring all users have complex passwords

D.

Disabling Wi-Fi connections

Questions 33

A company is developing a new system to process personal information about its customers, including their names, addresses, and purchase histories.

Which term describes the process of identifying and evaluating the potential effects that the new system may have on the privacy of personal information and developing strategies to mitigate those risks?

Options:
A.

Data Protection Impact Assessment (DPIA)

B.

Business Continuity Planning (BCP)

C.

Risk Management

D.

Disaster Recovery (DR)

Questions 34

A large healthcare provider is acquiring a small clinic and has identified a full understanding of the clinic's organizational risks. The large provider has several tools it can implement to reduce the clinic's identified risks.

Which type of risk response should the healthcare provider use?

Options:
A.

Risk acceptance

B.

Risk mitigation

C.

Risk transference

D.

Risk avoidance

Questions 35

A company is developing a new system to process personal information about its customers, including their names, addresses, and purchase histories.

Which term describes the process of identifying and evaluating the potential effects that the new system may have on the privacy of personal information and developing strategies to mitigate those risks?

Options:
A.

Disaster recovery (DR)

B.

Business continuity planning (BCP)

C.

Data Protection Impact Assessment (DPIA)

D.

Risk management

Questions 36

Which risk management strategy will ensure the secure configuration and deployment of a new supply chain management system and prevent identity theft?

Options:
A.

Use of a strict firewall policy to restrict access to the system’s server

B.

Implementation of multifactor authentication for all user accounts

C.

Implementation of regular vulnerability scans and patch management

D.

Configuration of the system to disable all USB ports on all workstations

Questions 37

An IT organization has recently migrated its servers to the cloud. The security team needs to delegate administrative control of multiple cloud services to various administrators inside the company. This team needs a granular solution that will offer the most flexibility while maintaining a secure posture.

What is the best solution?

Options:
A.

Open Authorization (OAuth)

B.

Security Assertion Markup Language (SAML)

C.

Role-based access control (RBAC)

D.

Kerberos

Questions 38

A large technology company has discovered a known vulnerability in its network infrastructure.The infrastructure contains a number of retired assets that are no longer receiving security updates, which could potentially be exploited by attackers to compromise the network. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

Options:
A.

Conducting regular vulnerability scans to identify potential weaknesses

B.

Implementing intrusion detection and prevention systems (IDPS)

C.

Enforcing strict access control policies for all network devices

D.

Removing all end-of-life devices from the network

Questions 39

A company has identified a potential risk associated with a new software implementation, which could result in a significant data breach.

Which step of the risk management life cycle involves implementing security controls to prevent the risk?

Options:
A.

Assess

B.

Identify

C.

Control

D.

Review

Questions 40

While undergoing a security audit, it is determined that an organization has several backup repositories hosted in the cloud without any level of protection.

Which action should be taken to protect the backup repositories first?

Options:
A.

Audit access logs

B.

Run a vulnerability scan

C.

Restrict access to the backups

D.

Disable the backup repositories

WGU Related Exams

How to pass WGU Managing-Human-Capital - WGU Managing Human Capital C202 Exam
How to pass WGU Integrated-Physical-Sciences - WGU Integrated Physical Sciences (MTC1) Exam
How to pass WGU Organizational-Behaviors-and-Leadership - WGU Organizational Behaviors and Leadership (IBC1) Exam
How to pass WGU Principles-of-Management - Principles of Management at Western Governors University(IAC1) Exam
How to pass WGU Web-Development-Applications - WGU Web Development Applications (KVO1) Exam
How to pass WGU Ethics-In-Technology - WGU Ethics In TechnologyQCO1 Exam
How to pass WGU Information-Technology-Management - WGU Information Technology Management QGC1 Exam
How to pass WGU Secure-Software-Design - WGU Secure Software Design (D487) Exam Exam
How to pass WGU Network-and-Security-Foundation - Network-and-Security-Foundation Exam
How to pass WGU Data-Management-Foundations - WGU Data Management – Foundations Exam Exam
How to pass WGU Cloud-Deployment-and-Operations - WGUCloud Deployment and Operations Exam

WGU Free Exams

WGU Free Exams
Examstrack offers comprehensive free resources and practice tests for WGU exams.