Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free WGU Cybersecurity-Architecture-and-Engineering Practice Exam with Questions & Answers | Set: 6

Questions 51

An organization needs to securely exchange confidential documents with a third-party vendor overan unsecured network connection. The organization wants to ensure that the documents can only be read by the intended recipient and cannot be intercepted or read by unauthorized parties.

Which type of encryption meets the needs of the organization?

Options:
A.

Stream ciphers

B.

Asymmetric encryption

C.

Block ciphers

D.

Hash functions

WGU Cybersecurity-Architecture-and-Engineering Premium Access
Questions 52

Which technique allows someone to obtain a password while it is in transit?

Options:
A.

Packet sniffing

B.

Buffer overflow

C.

Phishing

D.

Black hat

Questions 53

After a recent security assessment, it was discovered that many company devices have unnecessary ports opened to the network.

What should the company configure to fix this?

Options:
A.

Intrusion prevention system

B.

Web application firewall

C.

Device hardening

D.

Intrusion detection system

Questions 54

Which risk management strategy will ensure the secure configuration and deployment of a new supply chain management system and prevent identity theft?

Options:
A.

Use of a strict firewall policy to restrict access to the system’s server

B.

Configuration of the system to disable all universal serial bus (USB) ports on all workstations

C.

Implementation of regular vulnerability scans and patch management

D.

Implementation of multifactor authentication for all user accounts

Questions 55

After implementing a risk management plan for a new product launch, a project team conductedregular risk assessments to monitor the effectiveness of their control strategies.

Which step of the risk management life cycle was performed?

Options:
A.

Control

B.

Assess

C.

Identify

D.

Review

Questions 56

A software development company uses file transfer protocol (FTP) to transfer software code between different teams.

Which security control is essential for protecting the integrity of software code that is transferred using FTP?

Options:
A.

Calculating and comparing the hash values of the software code before and after transfer using FTP can help detect any changes and ensure the integrity of the code.

B.

Implementing intrusion detection and prevention systems can help detect and prevent unauthorized access to the FTP server and software code.

C.

Enforcing strict access controls can limit the number of users with access to the FTP server and prevent unauthorized access.

D.

Regularly backing up the software code stored in the FTP server and having a disaster recovery plan can help ensure the integrity of the software code.

Questions 57

Which risk management strategy will help defeat piracy efforts on a new patient management system?

Options:
A.

Configuration of the patient management system to disable all external device connections on all workstations

B.

Incorporation of end-to-end encryption for all patient data

C.

Implementation of regular virus scanning for all workstations

D.

Implementation of licensing technologies in order to restrict unauthorized access to the system

Questions 58

A software development company has experienced a noticeable slowdown in its network performance, which suggests that some machines on the network may have been infected by a botnet. The company has decided to analyze the threats and vulnerabilities within the enterprise based on the indicators of compromise to mitigate the risk.

What should the company do to detect a botnet and other malware-based threats within the enterprise based on the indicators of compromise?

Options:
A.

Use two-factor authentication for external users

B.

Define strict firewall rules

C.

Constantly scan for known signatures on every machine

D.

Implement a configuration management solution

Questions 59

Which motherboard component is used for short-term storage of data?

Options:
A.

Hard Drive

B.

BIOS

C.

Read Only Memory

D.

RAM

Questions 60

What allows a user to query information from an online database with a web application without revealing what they are viewing?

Options:
A.

Secure function evaluation (SFE)

B.

Private function evaluation (PFE)

C.

Homomorphic encryption

D.

Private information retrieval (PIR)

WGU Related Exams

How to pass WGU Managing-Human-Capital - WGU Managing Human Capital C202 Exam
How to pass WGU Integrated-Physical-Sciences - WGU Integrated Physical Sciences (MTC1) Exam
How to pass WGU Organizational-Behaviors-and-Leadership - WGU Organizational Behaviors and Leadership (IBC1) Exam
How to pass WGU Principles-of-Management - Principles of Management at Western Governors University(IAC1) Exam
How to pass WGU Web-Development-Applications - WGU Web Development Applications (KVO1) Exam
How to pass WGU Ethics-In-Technology - WGU Ethics In TechnologyQCO1 Exam
How to pass WGU Information-Technology-Management - WGU Information Technology Management QGC1 Exam
How to pass WGU Secure-Software-Design - WGU Secure Software Design (D487) Exam Exam
How to pass WGU Network-and-Security-Foundation - Network-and-Security-Foundation Exam
How to pass WGU Data-Management-Foundations - WGU Data Management – Foundations Exam Exam
How to pass WGU Cloud-Deployment-and-Operations - WGUCloud Deployment and Operations Exam

WGU Free Exams

WGU Free Exams
Examstrack offers comprehensive free resources and practice tests for WGU exams.