Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Online Cybersecurity-Architecture-and-Engineering Questions Video

WGU Cybersecurity Architecture and Engineering (KFO1/D488) Questions and Answers

Question 25

Which risk management strategy will supplement privacy requirements for data on an electronic health record (EHR) system?

Options:

A.

Configuration of the system to disable universal serial bus (USB) ports on all workstations

B.

Encryption of all network traffic between the EHR system and external networks

C.

Implementation of role-based access controls and encryption of all sensitive data

D.

Implementation of a strict firewall policy to restrict access to the system's server

Question 26

In which generation were computers first built with transistors?

Options:

A.

First generation

B.

Second generation

C.

Third generation

D.

Fourth generation

Question 27

How can the organizational culture support ethical guidelines?

Options:

A.

By outlining the roles of IT specialists in the organization

B.

By outlining the protocols to support security and privacy of data

C.

By creating the system requirements for computers in the organization

D.

By creating the government regulations that apply to the organization

Question 28

A company has identified a potential risk associated with a new software implementation, which could result in a significant data breach.

Which step of the risk management life cycle involves implementing security controls to prevent the risk?

Options:

A.

Assess

B.

Identify

C.

Control

D.

Review