100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU MASTER'S COURSE C795 - CYBERSECURITY MANAGEMENT II TACTICAL

Rating
-
Sold
-
Pages
57
Grade
A+
Uploaded on
14-02-2025
Written in
2024/2025

WGU MASTER'S COURSE C795 - CYBERSECURITY MANAGEMENT II TACTICAL

Institution
WGU C795
Course
WGU C795











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C795
Course
WGU C795

Document information

Uploaded on
February 14, 2025
Number of pages
57
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU MASTER'S COURSE C795 -
CYBERSECURITY MANAGEMENT II TACTICAL


A Chief Information Officer (Cio) Recently Read An Article Involving A Similar Company That
Was Hit With Ransomware Due To Ineffective Patch-Management Practices. The Cio Tasks A
Security Professional With Gathering Metrics On The Effectiveness Of The Company's Patch-
Management Program To Avoid A Similar Incident.

Which Method Enables The Security Professional To Gather Current, Accurate Metrics?

A Review Authenticated Vulnerability Scan Reports
B Review Reports From Windows Update
C Review Patch History On Nonproduction Systems
D Review Patch Tickets In The Change Control System - Answer A

A Combined Mail Server And Calendaring Server Environment Contains No Secure Sockets
Layer (Ssl) Certificate.

Which Security Principle Of The Cia Triad Is Affected By The Lack Of An Ssl Certificate?

A Confidentiality
B Integrity
C Authentication
D Availability - Answer A

A Company Develops A Business Continuity Plan In Addition To An Emergency
Communication Plan.

What Should Be Included In The Company's Emergency Communication Plan? (Choose 2)

A Alternate Means Of Contact
B Backup People For Each Role
C The Best Time To Call Each Person
D Employee's Phone Service Providers - Answer Ab

A Company Does Not Have A Disaster Recovery Plan (Drp) And Suffers A Multiday Power
Outage.

Which Provisioning Should The Company Perform To Provide Stable Power For A Long Period
Of Time?

A Purchase Generators
B Purchase Additional Servers

,C Create A Raid Array
D Create A Failover Cluster - Answer A

A Company Has Identified A Massive Security Breach In Its Healthcare Records Department.
Over 50% Of Customers' Personally Identifiable Information (Pii) Has Been Stolen. The
Customers Are Aware Of The Breach, And The Company Is Taking Actions To Protect
Customer Assets Through The Personal Security Policy, Which Addresses Pii Data.

Which Preventive Measure Should The Company Pursue To Protect Against Future Attacks?

A Require Cognitive Passwords
B Employ Password Tokens
C Use Network-Based And Host-Based Firewalls
D Install Auditing Tools - Answer C

A Company Has Signed A Contract With A Third-Party Vendor To Use The Vendor's Inventory
Management System Hosted In A Cloud. For Convenience, The Vendor Set Up The Application
To Use Lightweight Directory Access Protocol (Ldap) Queries But Did Not Enable Secure Ldap
Queries Or Implement A Secure Sockets Layer (Ssl) On The Application's Web Server. The
Vendor Does Not Have The Ability To Secure The System, And Company Management Insists
On Using The Application.

Which Defense-In-Depth Practices Should The Company Implement To Minimize The
Likelihood Of An Account Compromise Due To Insecure Setup By The Vendor?

A Location-Based Access Control And Multifactor Authentication
B Intrusion Prevention System (Ips) And Honeypot Systems
C Antivirus And Intrusion Detection System (Ids)
D Password Hashing And Authentication Encryption - Answer A

A Company Has User Credentials Compromised Through A Phishing Attack.

Which Defense-In-Depth Practice Will Reduce The Likelihood Of Misuse Of The User's
Credentials?

A Configure Firewall Rules
B Deploy Multifactor Authentication
C Deploy Radius Authentication
D Configure Encryption Protocols - Answer B

A Company Hires Several Contractors Each Year To Augment Its It Workforce. The Contractors
Are Granted Access To The Internal Corporate Network, But They Are Not Provided Laptops
Containing The Corporate Image. Instead, They Are Required To Bring Their Own Equipment.

Which Defense-In-Depth Practice Should Be Required For Contractor Laptops To Ensure That
Contractors Do Not Connect Infected Laptops To The Internal Corporate Network?

,A Enable Command-Line Audit Logging On Contractor Laptops
B Configure Devices To Not Autorun Content
C Configure Antimalware Scanning Of Removable Devices
D Ensure Antimalware Software And Signatures Are Updated - Answer D

A Company Is Concerned About Loss Of Data On Removable Media When Media Are Lost Or
Stolen.

Which Standard Should This Company Implement On All Flash Drives?

A Maximum Password Age
B Encryption
C Awareness Training
D Layer 2 Tunneling Protocol - Answer B

A Company Is Concerned About Securing Its Corporate Network, Including Its Wireless
Network, To Limit Security Risks.

Which Defense-In-Depth Practice Represents An Application Of Least Privilege?

A Implement Mutual Multifactor Authentication
B Configure Wi-Fi-Protected Access For Encrypted Communication
C Disable Wireless Access To Users Who Do Not Need It
D Implement An Intrusion Detection System - Answer C

A Company Is Concerned About Unauthorized Network Traffic.

Which Procedure Should The Company Implement To Block Ftp Traffic?

A Install A Packet Sniffer
B Update The Dns
C Filter Ports 20 And 21 At The Firewall
D Decrease The Network Bandwidth - Answer C

A Company Is Concerned About Unauthorized Programs Being Used On Network Devices.

Which Defense-In-Depth Strategy Would Help Eliminate Unauthorized Software On Network
Devices?

A Develop An Acceptable Use Policy And Update All Network Device Firmware
B Use Application Controls Tools And Update Applocker Group Policies
C Limit Administrative Access To Devices And Create Dhcp Scope Options
D Upgrade To A 64-Bit Operating System And Install An Antimalware Application - Answer B

, A Company Is Concerned About Unneeded Network Protocols Being Available On The
Network.

Which Two Defense-In-Depth Practices Should The Company Implement To Detect Whether
Ftp Is Being Used?Choose 2 Answers.

A Install Bios Firmware Updates
B Perform Automated Packet Scanning
C Implement Application Firewalls
D Physically Segment The Network - Answer Bc

A Company Is Concerned That Disgruntled Employees Are Sending Sensitive Data To Its
Competitors.

Which Defense-In-Depth Practices Assist A Company In Identifying An Insider Threat?

A Data Loss Prevention (Dlp) And Audit Logs
B Antivirus And Intrusion Detection Systems (Ids)
C Data Loss Prevention (Dlp) And Intrusion Detection Systems (Ids)
D Antivirus And Audit Logs - Answer A

A Company Is Hit With A Number Of Ransomware Attacks. These Attacks Are Causing A
Significant Amount Of Downtime And Data Loss Since Users With Access To Sensitive
Company Documents Are Being Targeted. These Attacks Have Prompted Management To
Invest In New Technical Controls To Prevent Ransomware.

Which Defense-In-Depth Practices Should This Company Implement?

A Password Resets And A Log Review
B Mandatory Vacations And Job Rotation
C Spam Filtering And Antimalware
D Encryption And An Internal Firewall - Answer C

A Company Is Implementing A Defense-In-Depth Approach That Includes Capturing Audit
Logs. The Audit Logs Need To Be Written In A Manner That Provides Integrity.

Which Defense-In-Depth Strategy Should Be Applied?

A Write The Data To A Write-Once, Read-Many (Worm) Drive
B Write The Data To An Encrypted Hard Drive
C Write The Data To An Encrypted Flash Drive
D Write The Data To An Sd Card And Store The Sd Card In A Safe - Answer A

A Company Is Moving Its Database Backups From An Off-Site Location To An Alternate
Processing Site Warehouse Using Bulk Transfers.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Lectpearl Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
46
Member since
2 year
Number of followers
19
Documents
1550
Last sold
2 months ago
LECTPEARL

I SELL EXAMS, PACKAGE DEALS, TESTBANKS TO ALL SUBJECTS AT AFFORDABLE PRICES. FEEL FREE TO REACH OUT FOR ASSISTANCE AND REFER ME TO YOUR FRIENDS, CHEERS!

4.4

5 reviews

5
3
4
1
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions