Computer Science > QUESTIONS & ANSWERS > WGU Master's Course C795 - Cybersecurity Management II Tactical with Complete Solutions (All)

WGU Master's Course C795 - Cybersecurity Management II Tactical with Complete Solutions

Document Content and Description Below

WGU Master's Course C795 - Cybersecurity Management II Tactical with Complete Solutions A combined mail server and calendaring server environment contains no secure sockets layer (SSL) certificate.... Which security principle of the CIA triad is affected by the lack of an SSL certificate? A Confidentiality B Integrity C Authentication D Availability -Answer- A A company does not have a disaster recovery plan (DRP) and suffers a multiday power outage. Which provisioning should the company perform to provide stable power for a long period of time? A Purchase generators B Purchase additional servers C Create a RAID array D Create a failover cluster -Answer- A A company is moving its database backups from an off-site location to an alternate processing site warehouse using bulk transfers. Which type of database recovery is this company employing? A Electronic vaulting B Remote journaling C Remote mirroring D Mutual assistance -Answer- A A company's business operations are disrupted due to a flash flood.Which consequences to business continuity should be addressed in the disaster recovery plan? A Evaluation of risk from possible flood damage B Identify essential personnel and decision makers C Provide flood-response training to the disaster recovery team D Provision additional backup power sources -Answer- A What is defined as the ability to maintain an acceptable level of operational status during events such as hardware failures or denial-of-service (DoS) attacks? A Fault tolerance B System resilience C Trusted recovery D Quality of service -Answer- B Which RAID array configuration is known as striping with parity and requires the use of three or more disks that spread the parity across all drives? A RAID 0 B RAID 1 C RAID 5 D RAID 10 -Answer- C A web server is at near 100% utilization, and it is suggested that several web servers run the same site, sharing traffic from the internet. Which system resilience method would this be? A Network load balancing B Failover clustering C Electronic vaulting D Remote journaling -Answer- A Which RAID array performs striping and uses mirroring for fault tolerance? A RAID 0 B RAID 1 C RAID 5 D RAID 10 -Answer- D Which kind of disaster recovery site typically consists of self-contained trailers? A Mobile B Hot C Warm D Cold -Answer- A How often should a business continuity plan (BCP) be reviewed? A At least annually or when changes occur B If and when the company gets audited C When a disaster occurs D Every five years or when a law changes -Answer- A Which database disaster recovery strategy transfers copies of database transaction logs to another location? A Electronic vaulting B Remote journaling C Disk mirroring D Floating parity -Answer- B A company develops a business continuity plan in addition to an emergency communication plan. What should be included in the company's emergency communication plan? (Choose 2) A Alternate means of contact B Backup people for each role C The best time to call each person D Employee's phone service providers -Answer- AB Which type of backup solution should be incorporated in an organization that has high-capacity backup data requirements in the terabytes? A Disk-to-disk B Tape C Optical media D High-capacity CD-RW -Answer- A Which data recovery strategy should be used to mitigate the risk of a natural disaster? A Perform a full local backup B Store tapes in a secure room C Hold backups on a shared drive D Back up data to a remote cloud provider -Answer- D Which two data recovery components will back up a file and change the archive bit to 0? (Choose 2) A Full backup B Differential backup C Incremental backup D Copy backup -Answer- AC Disaster recovery team members are requested to do more than just review the disaster recovery plan but not actually test the individual parts of the plan. Which type of test would suit this request? A Read-through B Structured walk-through C Parallel D Full-interruption -Answer- B When should formal change management be used to manage updates to a disaster recovery plan? A When the IT infrastructure changes, all related disaster-recovery documentation should be changed to match the environment. B When personnel changes, all related disaster-recovery documentation should be changed to match the staffing. C When regulations change, all related disaster-recovery documentation should be changed to match the regulations. D When management changes, all related disaster-recovery documentation should be changed to match the structure. -Answer- A A company presents team members with a disaster recovery scenario, asks members to develop an appropriate response, and then tests some of the technical responses without shutting down operations at the primary site. Which type of disaster recovery test is being performed? A Read-through B Structured walk-through C Simulation D Full-interruption -Answer- C Which defense-in-depth practices allow an organization to locate an intruder on its internal network? A Whitelisting applications and blacklisting processes B Antivirus and intrusion prevention system (IPS) C Security information and event management (SIEM) and intrusion detection system (IDS) D Sandboxing applications and penetration testing -Answer- C A company is concerned that disgruntled employees are sending sensitive data to its competitors. Which defense-in-depth practices assist a company in identifying an insider threat? A Data loss prevention (DLP) and audit logs B Antivirus and intrusion detection systems (IDS) C Data loss prevention (DLP) and intrusion detection systems (IDS) D Antivirus and audit logs -Answer- A A company is hit with a number of ransomware attacks. These attacks are causing a significant amount of downtime and data loss since users with access to sensitive company documents are being targeted. These attacks have prompted management to invest in new technical controls to prevent ransomware. Which defense-in-depth practices should this company implement? A Password resets and a log review B Mandatory vacations and job rotation C Spam filtering and antimalware D Encryption and an internal firewall -Answer- C A company's database administrator requires access to a database server to perform maintenance. The director of information technology will provide the database administrator access to the database server but will not provide the database administrator access to all the data within the server's database. Which defense-in-depth practice enhances the company's need-to-know data access strategy? A Using compartmented mode systems and least privilege B Using compartmented mode systems and two-person control C Using dedicated mode systems and least privilege D Using dedicated mode systems and two-person control -Answer- A A company has signed a contract with a third-party vendor to use the vendor's inventory management system hosted in a cloud. For convenience, the vendor set up the application to use Lightweight Directory Access Protocol (LDAP) queries but did not enable secure LDAP queries or implement a secure sockets layer (SSL) on the application's web server. The vendor does not have the ability to secure the system, and company management insists on using the application. Which defense-in-depth practices should the company implement to minimize the likelihood of an account compromise due to insecure setup by the vendor? A Location-based access control and multifactor authentication B Intrusion prevention system (IPS) and honeypot systems C Antivirus and intrusion detection system (IDS) D Password hashing and authentication encryption -Answer- A A company is terminating several employees with high levels of access. The company wants to protect itself from possible disgruntled employees who could become potential insider threats. Which defense-in-depth practices should be applied? A Account revocation and conducting a vulnerability assessment B Account revocation and conducting a full backup of critical data C A mandatory 90-day password change and conducting a full backup of critical data D A mandatory 90-day password change and conducting a vulnerability assessment -Answer- A A hacker is sitting between a corporate user and the email server that the user is currently accessing. The hacker is trying to intercept and capture any data the user is sending through the email application. How should a system administrator protect the company's email server from this attack? A Encrypt network traffic with VPNs B Add antimalware to the email server C Implement a firewall D Whitelist the sites that are trusted -Answer- A A company wants to prevent cybercriminals from gaining easy access into its email server. The company wants to know which user is accessing which resources and to prevent hackers from easily gaining access to the server. Which defense-in-depth strategy should be used? A Authenticate users and devices and log events within the network B Deploy VLANs for traffic separation and coarse-grained security C Place encryption throughout the network to ensure privacy D Use stateful firewall technology at the port level and log firewall activity -Answer- A [Show More]

Last updated: 1 year ago

Preview 1 out of 57 pages

Reviews( 0 )

Recommended For You

 Information Technology> QUESTIONS & ANSWERS > Cybersecurity Management II - Tactical - C795 Ucertify Questions and Answers Latest 2022 (All)

preview
Cybersecurity Management II - Tactical - C795 Ucertify Questions and Answers Latest 2022

Cybersecurity Management II - Tactical - C795 Ucertify Questions and Answers Latest 2022 Question 1 :A security technician reports to you that a file server is experiencing unscheduled initial pro...

By Nutmegs , Uploaded: Aug 08, 2022

$10

 Information Technology> QUESTIONS & ANSWERS > WGU C795- Cybersecurity Management II – Tactical Latest Updated 2022 Graded A+ (All)

preview
WGU C795- Cybersecurity Management II – Tactical Latest Updated 2022 Graded A+

WGU C795- Cybersecurity Management II – Tactical Latest Updated 2022 Graded A+ Security Tests Correct Answer-Security tests verify that a control is functioning properly. These tests include autom...

By Nutmegs , Uploaded: Aug 08, 2022

$10

 Information Technology> QUESTIONS & ANSWERS > C795- Cybersecurity Management II (Tactical) Questions and Answers Already Passed (All)

preview
C795- Cybersecurity Management II (Tactical) Questions and Answers Already Passed

C795- Cybersecurity Management II (Tactical) Questions and Answers Already Passed What is a vulnerability? Correct Answer-a weakness in an information system, system security procedures, internal...

By Nutmegs , Uploaded: Aug 08, 2022

$10

 Information Technology> QUESTIONS & ANSWERS > WGU Master's Course C795 - Cybersecurity Management II Tactical Latest 2022 Rated A (All)

preview
WGU Master's Course C795 - Cybersecurity Management II Tactical Latest 2022 Rated A

WGU Master's Course C795 - Cybersecurity Management II Tactical Latest 2022 Rated A A combined mail server and calendaring server environment contains no secure sockets layer (SSL) certificate. W...

By Nutmegs , Uploaded: Aug 08, 2022

$11

 Computer Science> QUESTIONS & ANSWERS > WGU C795 Cybersecurity Management II – Tactical with complete solution;2022 (All)

preview
WGU C795 Cybersecurity Management II – Tactical with complete solution;2022

WGU C795 Cybersecurity Management II – Tactical with complete solution 1. As an IT security professional, you have just been hired by a multisite automotive dealership to protect and manage its compu...

By Alphascore , Uploaded: Oct 22, 2022

$10

 Computer Networking> QUESTIONS & ANSWERS > C795 Cybersecurity Management II - Tactical Questions and Answers 2022/2023 Graded A+ (All)

preview
C795 Cybersecurity Management II - Tactical Questions and Answers 2022/2023 Graded A+

As an IT security professional, you have just been hired by a multisite automotive dealership to protect and manage its computer network. What is your first task in establishing a secure defense syste...

By MARKALLAN , Uploaded: Aug 13, 2022

$11

 Information Technology> QUESTIONS & ANSWERS > WGU C795- Cybersecurity Management II – Tactical Latest Updated 2022 Graded A+ (All)

preview
WGU C795- Cybersecurity Management II – Tactical Latest Updated 2022 Graded A+

Security Tests Correct Answer-Security tests verify that a control is functioning properly. These tests include automated scans, tool-assisted penetration tests, and manual attempts to undermine sec...

By clairel^ , Uploaded: Jan 18, 2023

$8

 Information Technology> QUESTIONS & ANSWERS > WGU C795- Cybersecurity Management II – Tactical Latest Updated 2022 Graded A+ (All)

preview
WGU C795- Cybersecurity Management II – Tactical Latest Updated 2022 Graded A+

Security Tests Correct Answer-Security tests verify that a control is functioning properly. These tests include automated scans, tool-assisted penetration tests, and manual attempts to undermine sec...

By clairel^ , Uploaded: Jan 18, 2023

$9

 Information Technology> QUESTIONS & ANSWERS > Cybersecurity Management II - Tactical - C795 Ucertify Questions and Answers Latest 2022 (All)

preview
Cybersecurity Management II - Tactical - C795 Ucertify Questions and Answers Latest 2022

Question 1 :A security technician reports to you that a file server is experiencing unscheduled initial program loads (IPLs). Which statement BEST explains this problem? Correct Answer-The system is...

By clairel^ , Uploaded: Dec 08, 2022

$10

 Information Technology> QUESTIONS & ANSWERS > WGU C795- Cybersecurity Management II – Tactical Latest Updated 2022 Graded A+ (All)

preview
WGU C795- Cybersecurity Management II – Tactical Latest Updated 2022 Graded A+

Security Tests Correct Answer-Security tests verify that a control is functioning properly. These tests include automated scans, tool-assisted penetration tests, and manual attempts to undermine sec...

By AMAZING GRACE , Uploaded: Jan 07, 2023

$10

$9.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
46
0

Document information


Connected school, study & course



About the document


Uploaded On

Sep 22, 2022

Number of pages

57

Written in

Seller


seller-icon
Prof.Pierro

Member since 2 years

239 Documents Sold


Additional information

This document has been written for:

Uploaded

Sep 22, 2022

Downloads

 0

Views

 46

Document Keyword Tags

THE BEST STUDY GUIDES

Avoid resits and achieve higher grades with the best study guides, textbook notes, and class notes written by your fellow students

custom preview

Avoid examination resits

Your fellow students know the appropriate material to use to deliver high quality content. With this great service and assistance from fellow students, you can become well prepared and avoid having to resits exams.

custom preview

Get the best grades

Your fellow student knows the best materials to research on and use. This guarantee you the best grades in your examination. Your fellow students use high quality materials, textbooks and notes to ensure high quality

custom preview

Earn from your notes

Get paid by selling your notes and study materials to other students. Earn alot of cash and help other students in study by providing them with appropriate and high quality study materials.

WHAT STUDENTS SAY ABOUT US


What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·