WGU Cybersecurity Architecture and Engin…
Q: 1
Which risk management strategy will help prevent cheating using a learning management system as
a platform?
Options
Q: 2
A financial institution conducted a cybersecurity assessment, which identified several vulnerabilities
including outdated software and weak password policies. The company also needs to implement a
new core banking system that can handle a large number of transactions while ensuring the security
of customer data.
Which risk mitigation process is the most effective approach to address these vulnerabilities, and
what is the best topology for the new core banking system?
Options
Q: 3
A company has recently implemented a hybrid cloud deployment. The security team has been
notified about thousands of failed attempts to connect to routers and switches in the on-premises
network. A solution must be implemented to block connections after three unsuccessful SSH
attempts on any network device.
Which solution meets the requirements in this scenario?
Options
Q: 4
Which algorithm is suitable for ensuring the integrity of digital documents and detecting any
unauthorized modifications?
Options
Q: 5
An e-commerce company has recently experienced a data breach in which the personal and financial
information of its customers was stolen. The company is concerned about the potential for future
data breaches.
What is the most important factor to consider when evaluating the potential for future data breaches
in this scenario?
Options
Q: 6
A company is moving its applications to the cloud and is concerned about cyber security threats. The
security team has been tasked with providing a comprehensive view of how attackers gainaccess,
move through networks, and carry out attacks.
Which framework identifies the seven phases of an attack, from initial infiltration to post-
exploitation?
Options
Q: 7
A company is developing a new system to process personal information about its customers,
including their names, addresses, and purchase histories.
Which term describes the process of identifying and evaluating the potential effects that the new
system may have on the privacy of personal information and developing strategies to mitigate those
risks?
Options
Q: 8
What is a component of IT infrastructure?
Options
Q: 9
A company has discovered a vulnerability in its lightweight directory access protocol (LDAP)
implementation, which could potentially allow unauthorized access to sensitive information. The
company has decided to implement risk mitigation strategies to reduce the risk associated with this
vulnerability.
Which risk mitigation strategy will meet the needs of the company?
Options
Q: 10
What is the vocabulary and set of rules for instructing a computer to perform certain tasks?
Options
Question 1 of 10