100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU Master's Course C795 - Cybersecurity Management II Tactical $7.49   Add to cart

Exam (elaborations)

WGU Master's Course C795 - Cybersecurity Management II Tactical

 8 views  0 purchase
  • Course
  • Institution

WGU Master's Course C795 - Cybersecurity Management II Tactical A combined mail server and calendaring server environment contains no secure sockets layer (SSL) certificate. Which security principle of the CIA triad is affected by the lack of an SSL certificate? A Confidentiality B Inte...

[Show more]

Preview 4 out of 58  pages

  • July 23, 2022
  • 58
  • 2021/2022
  • Exam (elaborations)
  • Questions & answers
avatar-seller
WGU Master's Course C795 -
Cybersecurity Management II Tactical

A combined mail server and calendaring server environment contains no secure
sockets layer (SSL) certificate.

Which security principle of the CIA triad is affected by the lack of an SSL certificate?

A Confidentiality
B Integrity
C Authentication
D Availability Correct answer- A

A company does not have a disaster recovery plan (DRP) and suffers a multiday power
outage.

Which provisioning should the company perform to provide stable power for a long
period of time?

A Purchase generators
B Purchase additional servers
C Create a RAID array
D Create a failover cluster Correct answer- A

A company is moving its database backups from an off-site location to an alternate
processing site warehouse using bulk transfers.

Which type of database recovery is this company employing?

A Electronic vaulting
B Remote journaling
C Remote mirroring
D Mutual assistance Correct answer- A

A company's business operations are disrupted due to a flash flood.Which
consequences to business continuity should be addressed in the disaster recovery
plan?

A Evaluation of risk from possible flood damage
B Identify essential personnel and decision makers
C Provide flood-response training to the disaster recovery team
D Provision additional backup power sources Correct answer- A

,What is defined as the ability to maintain an acceptable level of operational status
during events such as hardware failures or denial-of-service (DoS) attacks?

A Fault tolerance
B System resilience
C Trusted recovery
D Quality of service Correct answer- B

Which RAID array configuration is known as striping with parity and requires the use of
three or more disks that spread the parity across all drives?

A RAID 0
B RAID 1
C RAID 5
D RAID 10 Correct answer- C

A web server is at near 100% utilization, and it is suggested that several web servers
run the same site, sharing traffic from the internet.

Which system resilience method would this be?

A Network load balancing
B Failover clustering
C Electronic vaulting
D Remote journaling Correct answer- A

Which RAID array performs striping and uses mirroring for fault tolerance?

A RAID 0
B RAID 1
C RAID 5
D RAID 10 Correct answer- D

Which kind of disaster recovery site typically consists of self-contained trailers?

A Mobile
B Hot
C Warm
D Cold Correct answer- A

How often should a business continuity plan (BCP) be reviewed?

A At least annually or when changes occur
B If and when the company gets audited
C When a disaster occurs

,D Every five years or when a law changes Correct answer- A

Which database disaster recovery strategy transfers copies of database transaction
logs to another location?

A Electronic vaulting
B Remote journaling
C Disk mirroring
D Floating parity Correct answer- B

A company develops a business continuity plan in addition to an emergency
communication plan.

What should be included in the company's emergency communication plan? (Choose 2)

A Alternate means of contact
B Backup people for each role
C The best time to call each person
D Employee's phone service providers Correct answer- AB

Which type of backup solution should be incorporated in an organization that has high-
capacity backup data requirements in the terabytes?

A Disk-to-disk
B Tape
C Optical media
D High-capacity CD-RW Correct answer- A

Which data recovery strategy should be used to mitigate the risk of a natural disaster?

A Perform a full local backup
B Store tapes in a secure room
C Hold backups on a shared drive
D Back up data to a remote cloud provider Correct answer- D

Which two data recovery components will back up a file and change the archive bit to
0? (Choose 2)

A Full backup
B Differential backup
C Incremental backup
D Copy backup Correct answer- AC

Disaster recovery team members are requested to do more than just review the disaster
recovery plan but not actually test the individual parts of the plan.

, Which type of test would suit this request?

A Read-through
B Structured walk-through
C Parallel
D Full-interruption Correct answer- B

When should formal change management be used to manage updates to a disaster
recovery plan?

A When the IT infrastructure changes, all related disaster-recovery documentation
should be changed to match the environment.

B When personnel changes, all related disaster-recovery documentation should be
changed to match the staffing.

C When regulations change, all related disaster-recovery documentation should be
changed to match the regulations.

D When management changes, all related disaster-recovery documentation should be
changed to match the structure. Correct answer- A

A company presents team members with a disaster recovery scenario, asks members
to develop an appropriate response, and then tests some of the technical responses
without shutting down operations at the primary site.

Which type of disaster recovery test is being performed?

A Read-through
B Structured walk-through
C Simulation
D Full-interruption Correct answer- C

Which defense-in-depth practices allow an organization to locate an intruder on its
internal network?

A Whitelisting applications and blacklisting processes
B Antivirus and intrusion prevention system (IPS)
C Security information and event management (SIEM) and intrusion detection system
(IDS)
D Sandboxing applications and penetration testing Correct answer- C

A company is concerned that disgruntled employees are sending sensitive data to its
competitors.

Which defense-in-depth practices assist a company in identifying an insider threat?

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller YANCHY. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67096 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling

Recently viewed by you


$7.49
  • (0)
  Add to cart