Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

New Release Cybersecurity-Architecture-and-Engineering Courses and Certificates Questions

WGU Cybersecurity Architecture and Engineering (KFO1/D488) Questions and Answers

Question 41

During a vulnerability assessment, several end-of-life operating systems were discovered within the environment.

Which action should be taken to resolve the issue?

Options:

A.

Shut down and remove the end-of-life machines

B.

Disconnect the end-of-life machines

C.

Block the end-of-life machines

D.

Upgrade the remaining end-of-life machines

Question 42

Which system conversion method deploys the new system while the old system is still operational in order to compare output?

Options:

A.

Phased

B.

Direct

C.

Parallel

D.

Pilot

Question 43

Which block cipher mode of operation for encrypting data is simple and efficient and provides no confidentiality beyond that of the underlying block cipher?

Options:

A.

Electronic codebook (ECB)

B.

Cipher block chaining (CBC)

C.

Counter (CTR)

D.

Output feedback (OFB)

Question 44

Which characteristic identifies intranet application software?

Options:

A.

Hosted by an outsourced provider

B.

Hosted in the internal business network

C.

Hosted by a third-party web portal

D.

Hosted on an individual computer