wgu d488 (Cybersecurity Architecture and Engineering)

WydenPorter 113 views 6 slides Dec 26, 2024
Slide 1
Slide 1 of 6
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6

About This Presentation

Cybersecurity Architecture and Engineering Exam (wgu d488)


Slide Content

Certsegfois

Cybursszurity-Arehltanture-and-
IR ea Mi. PP
QUESTION & ANEMERS

QUESTION: 1

‘Which data type should be used to calculate 90% of the retail price of an tem?

Option A: Floating-point
Option 8: Sting
Option €: Boolean

Option D : Auto number

Explanation/Referenc

‘ating pol datatypes ses fer numerica caleations that reale a decimal pont, such as percentages. In is case to
cast 90% fhe real pic an tema fost pont ata type necessary because can represent ot the whole

‘umber an the cal prof he number allowing for precie cleats.

QUESTION: 2

Which technique allows someone to obtain a password while itis in transit?

Option A: Packet siting
Option 8: Buffer overtiow
Option C: Phishing

Option D : Black hat

Explanation/Referenc

Pacha sing a technique uses Capture and analyze network rate, hch can inde interesting passwords while they
are in ans at packets ar transmite over ne, a packs str can capture se packet and they are

‘ot encrypted an read sense tomaton Be passwords. Theater options: Butler our is type a attack that
espeso programs memory handing, Ping so socio engineering lack to deceive users nto proving senate
information. Blackhat cefersto a hacker ih malus intent, nt specif technique. Therefore packet sitio correct
technique or btaing passos trans References: "Network Securty Essens: Appatios and Standar” by Willem
Saga explains packet sing and network security treat. "Camper Security: Principles aná Practice” y Wiliam
‘Sings and Lane Brown which covers network ack techniques including packet sii,

QUESTION: 3

How can the organizational culture support ethical guidlines?

Option A : By outlining the roles of I specialists in the organization
Option 8: By outring the protocols to support security and privacy of data
Option €: By creating the system requirements for computers in the organization

Option D : By creating the government regulations that apply tothe organization

Explanation/Reference:

‘rganizatonal cute can support tica quideines by establishing er protocols and ple hat promot he secur and
‘acy of ta. Ti ines: Data protection oles: Guideines on how dota shoul e handed, sted and protected
Ethic! hover. Ecourging employee to adhere o etica standards and practices Tang and awareness: Regular
ring sessions to educateemployes on seurty best rates and ethical bave Incident response: Petal fo
espondng to data breaches and athe ecu incidents strong rganiraina culture tat rires ata ecuty and
pay helps ensure that tical uieine are content alone. References Michael E man and Meret) Matar,
“principles of formation Sect,” Cengage Leaning. Rebecca Merl, Managing an information Secu and Privacy
arenes and Tring Program” CRC Pres.

QUESTION: 4

Whats scope creep?

Option A; Realization thatthe organization staffing is inadequate
Option 8; The extent ofthe project that acks needed requirements
Option : Small changes ina project that lead to bigger changes

Option D : When the project is completed in ess than the required time

Correct Answer: €

Explanation/Reference:

‘Scope rep efes to the phenomenon whee the cop fa projet gradually increases ver time due to sal, emer
‘changes that werent nal lame or approved. Ts can happen when: New fatureor requirements ae added whut
per evaluation or approval takeholercontiuousy request small changes or ations Lack fa ea scope
efintionand change conte process. These smal changes can accumulate easing to signant eins from he orinal
project pan affecting the project's schedule, budget, and veal sucess. References Project Management sue, "A Guide
tothe Projet Management ody of Krone (PMBOK Guide) PL Kathy Schwabe, “formation Technology Project
Management Cengage Leaning

QUESTION: 5

ich characteristic identifies intranet application sofware?

Option A; Hosted by an outsourced provider
Option B: Hosted in the internal business network
Option €: Hosted by a third-party web portal

Option D : Hosted on an individual computer

Correct Answer: B

Explanation/Reference:

lane plain Software: nvret aplcaions ae designe oe usd wen an again trol network. Tey are
‘ot accesible rom ouside te organizan unes trough secure connection ke 3 VN, Cartes Internal Hosting:
‘These oplatins oe hosted on servers tn th business net enuring ha only autre nel urs cn access

om. Secu: Since try ar hosted itera, hey canbe secure mt internal cuy measures ke frena and access
caro Increc Options: Describes apps hosted by externa provides, C: Descres aplicas haste by hi
party web portal. D: Desribs standalone aplican on inkl comptes, References Intranet appikatirs manet
Aoplcatens

QUESTION: 6

‘What are two differences between a handheld computer and a desktop? Choose 2 answers.

Option A : A handheld has more memory.
Option : A desktop has more memory.
Option € A desktop has more internal storage.

Option D : Ahandheld has more internal storage.

Explanation/Referenc

Desktops pally have more memory (RAM) and intemal rage (hard res o OS} compare to handheld computes. is
lows estos to handle more tense computing tasks nd str ger amount of ta. Handheld devices, onthe other
and proie pora and battery se over high storage and memery capaci.

QUESTION: 7

‘Which roe is responsible fr instaling new hardware and troubleshooting exiting hardware?

Option A: Web administrator
Option 8; System administrator
Option €: Security administrator

Option D : Network administrator

Correct Answer: B

Explanation/Reference:

A sstem administrators response for managing stalin, and maintain an rganizations computer sstems and
networks. Thi ole volves confguing ew hard, sting up user acount, trobleshaotng syste and nano,
and ensring te systems un fen.
Tags