Cybersecurity-Architecture-and-Engineering題庫資料,Cybersecurity-Architecture-and-Engineering題庫更新資訊每每談及到 PDFExamDumps 網站的 Cybersecurity-Architecture-and-Engineering 考題,很多人都稱贊其出題率是很高的,讓許多人的 WGU 證照之路沒有後顧之憂。“萬事俱備,只欠東風。”如果你沒有最新的 Cybersecurity-Architecture-and-Engineering 考題作參照,再多的努力,是沒有用的,畢竟我們的 Cybersecurity-Architecture-and-Engineering 考題可以作為真實考題題型的參照,讓大家順利進入了理想的單位。 最新的 Courses and Certificates Cybersecurity-Architecture-and-Engineering 免費考試真題 (Q209-Q214):問題 #209
Which software allows the user to easily access the hardware of a computer?
A. Application
B. Operating system
C. Productivity
D. FTP client
答案:B
解題說明:
The operating system (OS) is the primary software that manages all the hardware and other software on a computer. It acts as an intermediary between users and the computer hardware. The OS handles basic tasks such as controlling and allocating memory, prioritizing system requests, controlling input and output devices, facilitating networking, and managing files. Examples include Windows, macOS, and Linux.
問題 #210
What is one purpose of an End User License Agreement?
A. Allow customers to legally create and sell a new version of the software
B. Allow customers to legally use the software
C. Allow customers to legally modify and compile the source code
D. Allow customers to legally distribute the application to other users
答案:B
解題說明:
* AnEnd User License Agreement (EULA)is a legal contract between the software manufacturer and the user.
* The primary purpose of a EULA is togrant the user the right to use the software.
* It outlines the terms and conditions under which the software can be used.
* This can include restrictions on installation, distribution, and modification.
* The EULA helps protect the intellectual property rights of the software creator.
References:
* "Software Licensing Handbook" by Jeffrey I. Gordon.
* "Intellectual Property and Open Source" by Van Lindberg.
問題 #211
An IT team has been tasked with improving the security of a company's web applications.
Which threats should the IT team consider detecting when defending the network with a web application firewall (WAF)?
A. Social engineering attacks
B. Brute force attacks
C. Phishing attacks
D. Structured Query Language (SQL) injection attacks
答案:D
解題說明:
The correct answer is C - Structured Query Language (SQL) injection attacks.
As per WGU Cybersecurity Architecture and Engineering (KFO1 / D488), a Web Application Firewall (WAF) protects web applications by filtering and monitoring HTTP traffic. It isspecifically effective against attacks such as SQL injection, cross-site scripting (XSS), and other application-layer vulnerabilities.
Phishing (A) and social engineering (D) involve human deception, not web application vulnerabilities. Brute force attacks (B) typically target authentication but are not the primary focus of a WAF.
Reference Extract from Study Guide:
"A web application firewall (WAF) detects and prevents attacks against web applications, including SQL injection and cross-site scripting (XSS)."
- WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Web Application Firewall and Threat Protection
問題 #212
A financial institution is concerned about a potential data breach due to employees accessing the company network using personal devices. They have decided to implement a bring your own device (BYOD) policy to mitigate the risk.
Which risk mitigation strategy will reduce the risk of a data breach in this scenario?
A. Blocking access to the company network from personal devices
B. Providing security awareness training for employees
C. Conducting regular security audits of the company network
D. Implementing a mobile device management (MDM) solution
答案:D
解題說明:
The correct answer is C - Implementing a mobile device management (MDM) solution.
WGU Cybersecurity Architecture and Engineering (KFO1 / D488) describes that an MDM solution enables organizations to enforce security policies on personal devices, such as encryption, remote wipe capabilities, and application controls. MDM allows safe access to corporate resources while managing the inherent risks of BYOD environments.
Blocking access (A) contradicts the BYOD policy goal. Security audits (B) monitor but do not control personal devices. Awareness training (D) is important but does not enforce technical protections on devices.
Reference Extract from Study Guide:
"Mobile device management (MDM) solutions enforce security policies on employee-owned devices, ensuring compliance and reducing the risks associated with BYOD implementations."
- WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Mobile Device Security
問題 #213
Which task is the responsibility of a database administrator?
A. Deciding on database applications for the company
B. Compiling code into an executable file
C. Installing and configuring databases
D. Troubleshooting network security issues
答案:C
解題說明:
* ADatabase Administrator (DBA)is responsible for managing the database infrastructure.
* Primary responsibilitiesinclude:
* Installing and configuringnew databases and database servers.
* Ensuring databases run efficiently and are properly maintained.
* Performingbackup and recoveryoperations to prevent data loss.
* Monitoring performanceand tuning databases for optimal performance.
* Implementingsecurity measuresto protect the database against unauthorized access.
References:
* "Database Administration: The Complete Guide to DBA Practices and Procedures" by Craig S. Mullins.
* Oracle and Microsoft SQL Server official documentation.