Information Technology > QUESTIONS & ANSWERS > WGU C795 Cyber Security Management II Tactical Questions and Answers 100% Pass (All)
WGU C795 Cyber Security Management II Tactical Questions and Answers 100% Pass A company's main asset is a physical working prototype stored in the research and development department. The prototy... pe is not currently connected to the company's network. Which privileged user activity should be monitored? a. Accessing camera logs b. Adding accounts to the administrator group c. Running scripts in PowerShell d. Disabling host firewall Correct Answer-a A company performs a data audit on its critical information every six months. Company policy states that the audit cannot be conducted by the same employee within a two-year time frame. Which principle is this company following? a. Job rotation b. Two person control c. Least privilege d. Need to know Correct Answer-a A user is granted access to restricted and classified information but is supplied only with the information for a current assignment. Which type of authorization mechanism is being applied in this scenario? a. Need to know b. Constrained interface c. Duty separation d Access control list Correct Answer-a Which two data recovery components will back up a file and change the archive bit to 0? Choose 2 answers. a. Full backup b. Differential backup c. Incremental backup d. Copy backup Correct Answer-a, c A company wants to monitor the inbound and outbound flow of packets and not the content. Which defense-in-depth strategy should be implemented? a. The organization should use egress filtering on the network. b. Traffic and trend analyses should be installed on the router. c. The administrator should configure network data loss prevention. d. RADIUS authentication should be used on the bastion host. Correct Answer-b A penetration tester identifies a SQL injection vulnerability in a business-critical web application. The security administrator discusses this finding with the application developer, and the developer insists that the issue would take two months to remediate. Which defense-in-depth practice should the security administrator use to prevent an attacker from exploiting this weakness before the developer can implement a fix? a. Perform daily vulnerability scans b. Implement a web-application firewall [Show More]
Last updated: 2 years ago
Preview 1 out of 23 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
WGU C795- Cybersecurity Management II – Tactical Bundled Exams Questions and Answers with Complete Solutions
By Nutmegs 2 years ago
$20
8
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Aug 08, 2022
Number of pages
23
Written in
This document has been written for:
Uploaded
Aug 08, 2022
Downloads
3
Views
231
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·