Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free Access WGU Cybersecurity-Architecture-and-Engineering New Release

WGU Cybersecurity Architecture and Engineering (KFO1/D488) Questions and Answers

Question 17

A company has recently implemented a hybrid cloud deployment. The security team has been notified about thousands of failed attempts to connect to routers and switches in the on-premises network. A solution must be implemented to block connections after three unsuccessful SSH attempts on any network device.

Which solution meets the requirements in this scenario?

Options:

A.

Data loss prevention

B.

Firewall

C.

Intrusion prevention system

D.

File integrity monitoring

Question 18

Which risk management strategy will secure an application from potential malware and advanced persistent threats?

Options:

A.

Encryption of all sensitive data stored within the application

B.

Configuration of the application to require strong, unique passwords for all user accounts

C.

Installation of the latest antivirus software on all computers that will access the application

D.

Implementation of a strict firewall policy to restrict access to the application's server

Question 19

A security engineer has been asked to audit unapproved changes that have recently taken place in a corporate application.

Which logging mechanism will create an audit trail?

Options:

A.

NetFlow logs

B.

Access logs

C.

Packet capture logs

D.

Router logs

Question 20

A company with a hybrid cloud deployment needs to identify all possible threat types that could impact production systems.

Which threat hunting technique should be used to identify potential attacks that have already occurred?

Options:

A.

Honeypots

B.

Log analysis

C.

Social engineering

D.

Penetration testing