View Mode
Q: 11
A company is concerned about the potential risks associated with unauthorized modifications to the Basic Input/Output System (BIOS) firmware on its servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk. Which technique will prevent unauthorized modifications to the BIOS firmware on a server?
Options
Q: 12
A financial institution conducted a cybersecurity assessment, which identified several vulnerabilities, including outdated software and weak password policies. The company also needs to implement a new core banking system that can handle a large number of transactions while ensuring the security of customer data. Which risk mitigation process is the most effective approach to address these vulnerabilities, and what is the best topology for the new core banking system?
Options
Q: 13

HOTSPOT Match the legislative purpose with the corresponding legislation. Answer options may be used more than once or not at all. WGU Cybersecurity Architecture and Engineering question

Your Answer
Q: 14
A company has recently experienced a data breach in which customer information was stolen. The company is concerned about the potential for future data breaches. A review of the incident revealed that the breach originated from stolen credentials. Which security measure will meet the needs of this company?
Options
Q: 15
Which stream cipher is a variant of the Salsa20 cipher, designed to be fast, secure, and resistant to cryptanalysis, and is commonly used in combination with the Poly1305 authentication mode?
Options
Q: 16
An IT organization recently implemented a hybrid cloud deployment. The security team must be able to correlate event data combined from different sources in a central location. What is the best solution?
Options
Q: 17
Which encryption technique can be used to enable a third-party provider to perform calculations on encrypted data without decrypting the data?
Options
Q: 18
In which generation were computers first built with transistors?
Options
Q: 19
An IT organization has recently implemented a hybrid cloud deployment. The server team is deploying a new set of domain-joined Windows servers on cloud-based virtual machines. Users must be able to use their Active Directory credentials to sign in to applications regardless of whether they are running on Windows servers in the cloud or on-premises.
Options
Q: 20
How are IT and globalization related?
Options
Question 11 of 20 · Page 2 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE