Information Technology > QUESTIONS & ANSWERS > WGU C795 Cyber Security Management II Tactical Questions and Answers 100% Pass (All)

WGU C795 Cyber Security Management II Tactical Questions and Answers 100% Pass

Document Content and Description Below

WGU C795 Cyber Security Management II Tactical Questions and Answers 100% Pass A company's main asset is a physical working prototype stored in the research and development department. The prototy... pe is not currently connected to the company's network. Which privileged user activity should be monitored? a. Accessing camera logs b. Adding accounts to the administrator group c. Running scripts in PowerShell d. Disabling host firewall Correct Answer-a A company performs a data audit on its critical information every six months. Company policy states that the audit cannot be conducted by the same employee within a two-year time frame. Which principle is this company following? a. Job rotation b. Two person control c. Least privilege d. Need to know Correct Answer-a A user is granted access to restricted and classified information but is supplied only with the information for a current assignment. Which type of authorization mechanism is being applied in this scenario? a. Need to know b. Constrained interface c. Duty separation d Access control list Correct Answer-a Which two data recovery components will back up a file and change the archive bit to 0? Choose 2 answers. a. Full backup b. Differential backup c. Incremental backup d. Copy backup Correct Answer-a, c A company wants to monitor the inbound and outbound flow of packets and not the content. Which defense-in-depth strategy should be implemented? a. The organization should use egress filtering on the network. b. Traffic and trend analyses should be installed on the router. c. The administrator should configure network data loss prevention. d. RADIUS authentication should be used on the bastion host. Correct Answer-b A penetration tester identifies a SQL injection vulnerability in a business-critical web application. The security administrator discusses this finding with the application developer, and the developer insists that the issue would take two months to remediate. Which defense-in-depth practice should the security administrator use to prevent an attacker from exploiting this weakness before the developer can implement a fix? a. Perform daily vulnerability scans b. Implement a web-application firewall [Show More]

Last updated: 2 years ago

Preview 1 out of 23 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Also available in bundle (1)

WGU C795- Cybersecurity Management II – Tactical Bundled Exams Questions and Answers with Complete Solutions

WGU C795- Cybersecurity Management II – Tactical Bundled Exams Questions and Answers with Complete Solutions

By Nutmegs 2 years ago

$20

8  

Reviews( 0 )

$10.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

231
3

Document information


Connected school, study & course


About the document


Uploaded On

Aug 08, 2022

Number of pages

23

Written in

Seller


seller-icon
Nutmegs

Member since 4 years

622 Documents Sold

Reviews Received
77
14
8
2
21
Additional information

This document has been written for:

Uploaded

Aug 08, 2022

Downloads

 3

Views

 231

Document Keyword Tags


$10.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·