Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the WGU Courses and Certificates Cybersecurity-Architecture-and-Engineering Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam Cybersecurity-Architecture-and-Engineering Premium Access

View all detail and faqs for the Cybersecurity-Architecture-and-Engineering exam


456 Students Passed

89% Average Score

95% Same Questions
Viewing page 1 out of 6 pages
Viewing questions 1-10 out of questions
Questions # 1:

A company has recently experienced a data breach from an insider threat and wants to implement a policy to reduce the risk of similar incidents in the future. During the incident, the insider threat accessed sensitive information stored in the administrator account from their user account. The insider threat was not in a supervisory role at the time of the incident.

Which policy should the company implement?

Options:

A.

Password complexity policy

B.

Separation of duties

C.

Least privilege

D.

Job rotation

Questions # 2:

In which generation were computers first built with transistors?

Options:

A.

First generation

B.

Second generation

C.

Third generation

D.

Fourth generation

Questions # 3:

A company may choose to use CDs, DVDs, hard drives, or even cloud storage for data backup.

Which aspect of data backup does this statement describe?

Options:

A.

Data mirroring

B.

Incremental backups

C.

Image backups

D.

Backup media

Questions # 4:

What is the role of the compiler?

Options:

A.

To take the most recent line of code, translate it, and execute the machine code

B.

To create an executable program by translating all of the code at one time

C.

To run scripting languages to test one line of code at a time

D.

To create executable code that is compatible with different operating systems

Questions # 5:

An organization needs to securely exchange confidential documents with a third-party vendor overan unsecured network connection. The organization wants to ensure that the documents can only be read by the intended recipient and cannot be intercepted or read by unauthorized parties.

Which type of encryption meets the needs of the organization?

Options:

A.

Stream ciphers

B.

Asymmetric encryption

C.

Block ciphers

D.

Hash functions

Questions # 6:

The security operations center (SOC) team has been alerted about malicious traffic on the corporate network and is concerned about a distributed denial of service (DDoS) attack. An analyst has been tasked with inspecting network traffic in the on-premises data center to investigate the issue.

Which type of file should the analyst use to inspect the traffic?

Options:

A.

Web server access log

B.

Syslog messages

C.

Operating system event log

D.

Packet capture

Questions # 7:

A security team has been informed that user data on the network has been compromised.

What is the first step the organization should take to respond to this data breach?

Options:

A.

Notify affected users of the incident

B.

Implement an access control policy

C.

Increase encryption levels

D.

Publicly announce the breach

Questions # 8:

An organization's board of directors is reviewing the risk register and attempting to evaluate whether there is too much risk for the organization.

Which metric should the board review?

Options:

A.

Risk appetite

B.

Risk evaluation plan

C.

Risk treatment plan

D.

Risk tolerance

Questions # 9:

Which risk management strategy will secure an application from potential malware and advanced persistent threats?

Options:

A.

Encryption of all sensitive data stored within the application

B.

Configuration of the application to require strong, unique passwords for all user accounts

C.

Installation of the latest antivirus software on all computers that will access the application

D.

Implementation of a strict firewall policy to restrict access to the application's server

Questions # 10:

Which software allows the user to easily access the hardware of a computer?

Options:

A.

Productivity

B.

FTP client

C.

Application

D.

Operating system

Viewing page 1 out of 6 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.