Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

PA -D487 Questions With Correct Detailed Answers.

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
20-10-2024
Written in
2024/2025

PA -D487 Questions With Correct Detailed Answers.

Institution
WGU D487
Course
WGU D487

Content preview

PA -D487 Questions With Correct
Detailed Answers.
The security team recently enabled public access to a web application hosted on a
server inside the corporate network. The developers of the application report that the
server has received several structured query language (SQL) injection attacks in the
past several days. The team needs to deploy a solution that will block the SQL injection
attacks. Which solution fulfills these requirements? - ANSWER- Web application firewall
(WAF)

An IT security team has been notified that external contractors are using their personal
laptops to gain access to the corporate network. The team needs to recommend a
solution that will prevent unapproved devices from accessing the network. Which
solution fulfills these requirements? - ANSWER- Implementing port security

The chief technology officer for a small publishing company has been tasked with
improving the company's security posture. As part of a network upgrade, the company
has decided to implement intrusion detection, spam filtering, content filtering, and
antivirus controls. The project needs to be completed using the least amount of
infrastructure while meeting all requirements. Which solution fulfills these requirements?
- ANSWER- Deploying a unified threat management (UTM) appliance

The security team plans to deploy an intrusion detection system (IDS) solution to alert
engineers about inbound threats. The team already has a database of signatures that
they want the IDS solution to validate. Which detection technique meets the
requirements? - ANSWER- Signature-based detection

An IT organization had a security breach after deploying an update to its production web
servers. The application currently goes through a manual update process a few times
per year. The security team needs to recommend a failback option for future
deployments. Which solution fulfills these requirements? - ANSWER- Implementing
versioning

A software development team is working on a new mobile application that will be used
by customers. The security team must ensure that builds of the application will be
trusted by a variety of mobile devices. Which solution fulfills these requirements? -
ANSWER- Code signing

An IT organization recently suffered a data leak incident. Management has asked the
security team to implement a print blocking mechanism for all documents stored on a
corporate file share. Which solution fulfills these requirements? - ANSWER- Digital
rights management (DRM)

, A company has recently discovered that a competitor is distributing copyrighted videos
produced by the in-house marketing team. Management has asked the security team to
prevent these types of violations in the future. Which solution fulfills these
requirements? - ANSWER- Digital rights management (DRM)

A security team has been tasked with performing regular vulnerability scans for a cloud-
based infrastructure. How should these vulnerability scans be conducted when
implementing zero trust security? - ANSWER- Automatically

A healthcare company needs to ensure that medical researchers cannot inadvertently
share protected health information (PHI) data from medical records. What is the best
solution? - ANSWER- Anonymization

A security team has been tasked with mitigating the risk of stolen credentials after a
recent breach. The solution must isolate the use of privileged accounts. In the future,
administrators must request access to mission-critical services before they can perform
their tasks. What is the best solution? - ANSWER- Privileged access management
(PAM)

A global manufacturing company is moving its applications to the cloud. The security
team has been tasked with hardening the access controls for a corporate web
application that was recently migrated. End users should be granted access to different
features based on their locations and departments. Which access control solution
should be implemented? - ANSWER- Attribute-based access control (ABAC)

A team of developers is building a new corporate web application. The security team
has stated that the application must authenticate users through two separate channels
of communication. Which type of authentication method should the developers include
when building the application? - ANSWER- Out-of-band authentication

An IT organization is implementing a hybrid cloud deployment. Users should be able to
sign in to all corporate resources using their email addresses as their usernames,
regardless of whether they are accessing an application on-premises or in the cloud.
Which solution meets this requirement? - ANSWER- Single sign-on (SSO)

The security team has been tasked with implementing a secure authorization protocol
for its web applications. Which of the following protocols provides the best method for
securely authenticating users and granting access? - ANSWER- Open Authentication
(OAuth)

An IT team is preparing the network for a hybrid cloud deployment. A security analyst
recently discovered that the firmware of a router in the core data center has been
compromised. According to the analyst, the attack occurred over a year ago without
being detected. Which type of threat actor is the most likely cause of the attack? -
ANSWER- Advanced persistent threat

Written for

Institution
WGU D487
Course
WGU D487

Document information

Uploaded on
October 20, 2024
Number of pages
8
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$10.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Divinehub Exam
Follow You need to be logged in order to follow users or courses
Sold
282
Member since
3 year
Number of followers
172
Documents
4253
Last sold
2 days ago
NURSING EXAMS AND STUDY GUIDES

Welcome to the best educational world with the brightest, most amazing, and all complete study materials. I wish you great,easy learning and success throughout your course. Kindly message me if you can\'t find your tutorials

3.9

46 reviews

5
24
4
6
3
9
2
0
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions