Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Selected Cybersecurity-Architecture-and-Engineering Courses and Certificates Questions Answers

WGU Cybersecurity Architecture and Engineering (KFO1/D488) Questions and Answers

Question 49

A corporate website is currently being redesigned, which leaves it vulnerable to security threats. Management does not want to provide an attacker with any information about the web server.

Which strategy should be used to prevent an attacker from gaining unauthorized information?

Options:

A.

Enabling Hypertext Transfer Protocol Secure (HTTPS) over Domain Name Service (DNS)

B.

Using Hypertext Transfer Protocol Secure (HTTPS) for all page and content requests

C.

Obfuscating error messages on the site or within the uniform resource locator (URL)

D.

Becoming Payment Card Industry Data Security Standard (PCI-DSS) compliant and certified

Question 50

How are IT and globalization related?

Options:

A.

IT allows businesses to have a global reach.

B.

IT allows businesses to reach global HIPAA compliance.

C.

IT allows businesses to create tax havens for global companies.

D.

IT allows businesses to create a global common gateway interface (CGI).

Question 51

What is the correct order of project phases?

Options:

A.

1)Initiation2)Executing3)Planning4)Monitoring and Controllings) Closing

B.

1) Planning2) InitiationAMonitoring and Controlling4) Executings) Closing

C.

1) Executing2) Monitoring and Controlling3) Initiation4) Planning5) Closing

D.

1) Initiation2) Planning° 3) Executing4) Monitoring and Controllings) Closing

Question 52

The development team has requested permission to use several open-source libraries to build a corporate web application.

Which resource can the security team recommend to ensure these libraries can be trusted?

Options:

A.

Agile software development

B.

Waterfall software development

C.

Common Vulnerabilities and Exposures (CVE)

D.

Continuous delivery