100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
PA -D487 Questions With Correct Detailed Answers. $10.49   Add to cart

Exam (elaborations)

PA -D487 Questions With Correct Detailed Answers.

 0 view  0 purchase
  • Course
  • WGU D487
  • Institution
  • WGU D487

PA -D487 Questions With Correct Detailed Answers.

Preview 2 out of 8  pages

  • October 20, 2024
  • 8
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU D487
  • WGU D487
avatar-seller
Divinehub
PA -D487 Questions With Correct
Detailed Answers.
The security team recently enabled public access to a web application hosted on a
server inside the corporate network. The developers of the application report that the
server has received several structured query language (SQL) injection attacks in the
past several days. The team needs to deploy a solution that will block the SQL injection
attacks. Which solution fulfills these requirements? - ANSWER- Web application firewall
(WAF)

An IT security team has been notified that external contractors are using their personal
laptops to gain access to the corporate network. The team needs to recommend a
solution that will prevent unapproved devices from accessing the network. Which
solution fulfills these requirements? - ANSWER- Implementing port security

The chief technology officer for a small publishing company has been tasked with
improving the company's security posture. As part of a network upgrade, the company
has decided to implement intrusion detection, spam filtering, content filtering, and
antivirus controls. The project needs to be completed using the least amount of
infrastructure while meeting all requirements. Which solution fulfills these requirements?
- ANSWER- Deploying a unified threat management (UTM) appliance

The security team plans to deploy an intrusion detection system (IDS) solution to alert
engineers about inbound threats. The team already has a database of signatures that
they want the IDS solution to validate. Which detection technique meets the
requirements? - ANSWER- Signature-based detection

An IT organization had a security breach after deploying an update to its production web
servers. The application currently goes through a manual update process a few times
per year. The security team needs to recommend a failback option for future
deployments. Which solution fulfills these requirements? - ANSWER- Implementing
versioning

A software development team is working on a new mobile application that will be used
by customers. The security team must ensure that builds of the application will be
trusted by a variety of mobile devices. Which solution fulfills these requirements? -
ANSWER- Code signing

An IT organization recently suffered a data leak incident. Management has asked the
security team to implement a print blocking mechanism for all documents stored on a
corporate file share. Which solution fulfills these requirements? - ANSWER- Digital
rights management (DRM)

, A company has recently discovered that a competitor is distributing copyrighted videos
produced by the in-house marketing team. Management has asked the security team to
prevent these types of violations in the future. Which solution fulfills these
requirements? - ANSWER- Digital rights management (DRM)

A security team has been tasked with performing regular vulnerability scans for a cloud-
based infrastructure. How should these vulnerability scans be conducted when
implementing zero trust security? - ANSWER- Automatically

A healthcare company needs to ensure that medical researchers cannot inadvertently
share protected health information (PHI) data from medical records. What is the best
solution? - ANSWER- Anonymization

A security team has been tasked with mitigating the risk of stolen credentials after a
recent breach. The solution must isolate the use of privileged accounts. In the future,
administrators must request access to mission-critical services before they can perform
their tasks. What is the best solution? - ANSWER- Privileged access management
(PAM)

A global manufacturing company is moving its applications to the cloud. The security
team has been tasked with hardening the access controls for a corporate web
application that was recently migrated. End users should be granted access to different
features based on their locations and departments. Which access control solution
should be implemented? - ANSWER- Attribute-based access control (ABAC)

A team of developers is building a new corporate web application. The security team
has stated that the application must authenticate users through two separate channels
of communication. Which type of authentication method should the developers include
when building the application? - ANSWER- Out-of-band authentication

An IT organization is implementing a hybrid cloud deployment. Users should be able to
sign in to all corporate resources using their email addresses as their usernames,
regardless of whether they are accessing an application on-premises or in the cloud.
Which solution meets this requirement? - ANSWER- Single sign-on (SSO)

The security team has been tasked with implementing a secure authorization protocol
for its web applications. Which of the following protocols provides the best method for
securely authenticating users and granting access? - ANSWER- Open Authentication
(OAuth)

An IT team is preparing the network for a hybrid cloud deployment. A security analyst
recently discovered that the firmware of a router in the core data center has been
compromised. According to the analyst, the attack occurred over a year ago without
being detected. Which type of threat actor is the most likely cause of the attack? -
ANSWER- Advanced persistent threat

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Divinehub. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

85651 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.49
  • (0)
  Add to cart