WGU C795 EXAM QUESTIONS AND ASNWERS LATEST 2023

WGU C795 EXAM QUESTIONS AND

ASNWERS LATEST 2023

A company's main asset is a physical working prototype stored in the research and

development department. The prototype is not currently connected to the company's

network.

Which privileged user activity should be monitored?

a. Accessing camera logs

b. Adding accounts to the administrator group

c. Running scripts in PowerShell

d. Disabling host firewall Correct answer- a

A company performs a data audit on its critical information every six months. Company

policy states that the audit cannot be conducted by the same employee within a twoyear time frame.

Which principle is this company following?

a. Job rotation

b. Two person control

c. Least privilege

d. Need to know Correct answer- a

A user is granted access to restricted and classified information but is supplied only with

the information for a current assignment.

Which type of authorization mechanism is being applied in this scenario?

a. Need to know

b. Constrained interface

c. Duty separation

d Access control list Correct answer- a

Which two data recovery components will back up a file and change the archive bit to

0?

Choose 2 answers.

a. Full backup


b. Differential backup

c. Incremental backup

d. Copy backup Correct answer- a, c

A company wants to monitor the inbound and outbound flow of packets and not the

content.

Which defense-in-depth strategy should be implemented?

a. The organization should use egress filtering on the network.

b. Traffic and trend analyses should be installed on the router.

c. The administrator should configure network data loss prevention.

d. RADIUS authentication should be used on the bastion host. Correct answer- b

A penetration tester identifies a SQL injection vulnerability in a business-critical web

application. The security administrator discusses this finding with the application

developer, and the developer insists that the issue would take two months to remediate.

Which defense-in-depth practice should the security administrator use to prevent an

attacker from exploiting this weakness before the developer can implement a fix?

a. Perform daily vulnerability scans

b. Implement a web-application firewall

c. Submit an urgent change control ticket

d. Deploy an anti malware agent to the web server Correct answer- b

A company is concerned about securing its corporate network, including its wireless

network, to limit security risks.

Which defense-in-depth practice represents an application of least privilege?

a. Implement mutual multifactor authentication

b. Configure Wi-Fi-Protected Access for encrypted communication

c. Disable wireless access to users who do not need it

d. Implement an intrusion detection system Correct answer- c

A technician notifies her supervisor that the nightly backup of a critical system failed

during the previous night's run. Because the system is critical to the organization, the

technician raised the issue in order to make management aware of the missing backup.

The technician is looking for guidance on whether additional actions should be taken on

the single backup failure.

Which role is responsible for making the final decision on how to handle the incomplete

backup?

a. Senior management


b. Data owner

c. Supervisor

d. Application administrator Correct answer- b

A company relies exclusively on a system for critical functions. An audit is performed,

and the report notes that there is no log review performed on the system. Management

has been tasked with selecting the appropriate person to perform the log reviews in

order to correct the deficiency.

Which role is responsible for reviewing and auditing logs in order to detect any

malicious behavior?

a. Security Administrator

b. System user

c. Database administrator

d. Senior management Correct answer- a

A company's main asset is its client list stored in the company database, which is

accessible to only specific users. The client list contains Health Insurance Portability

and Accountability Act (HIPAA) protected data.

Which user activity should be monitored?

a. Privilege escalation

b. Changing system time

c. Using database recovery tools

d. Configuring interfaces Correct answer- a

An employee is transferring data onto removable media. The company wants to reduce

the likelihood of fraud, and transferring data onto removable media is limited to special

cases.

Which security principle should the company execute as a policy to reduce fraud?

a. Two person control

b. Least privilege

c. Need to know

d. Job rotation Correct answer- a

An executive is using a cell phone to view sensitive data.

Which control would protect the sensitive data stored on the phone from being exposed

due to loss or theft?

a. Encryption

b. Anti-malware



No comments found.
Login to post a comment
This item has not received any review yet.
Login to review this item
No Questions / Answers added yet.
Price $14.00
Add To Cart

Buy Now
Category Exams and Certifications
Comments 0
Rating
Sales 0

Buy Our Plan

We have

The latest updated Study Material Bundle with 100% Satisfaction guarantee

Visit Now
{{ userMessage }}
Processing