New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

WGU (KFO1/D488) Cybersecurity Architecture and Engineering Exam - Topic 3 Question 7 Discussion

Actual exam question for WGU's WGU (KFO1/D488) Cybersecurity Architecture and Engineering exam
Question #: 7
Topic #: 3
[All WGU (KFO1/D488) Cybersecurity Architecture and Engineering Questions]

A cloud hosting provider is concerned about the potential risks associated with attacks that target the confidentiality and integrity of sensitive data stored on its servers' volatile memory. The provider has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this provider?

Show Suggested Answer Hide Answer
Suggested Answer: A

To protect datain use(within memory), the provider must implementhardware-level memory encryptionandtrusted execution environments(secure enclaves), which protect against cold boot attacks, memory scraping, and unauthorized access.

NIST SP 800-207A (Hardware-Enabled Security: Enclaves):

''Trusted execution environments and memory encryption mechanisms help ensure that data remains protected even when systems are compromised at lower levels.''

This is amodern cloud security best practiceespecially useful forconfidential computingenvironments.

WGU Course Alignment:

Domain:System Security Engineering / Cryptography

Topic:Protect data in use with hardware-based encryption and enclaves


Contribute your Thoughts:

0/2000 characters
Tammara
4 days ago
I remember practicing a question about endpoint security controls, and I think implementing strict access controls might also help mitigate risks related to sensitive data.
upvoted 0 times
...
Chana
10 days ago
I think using encryption for data in memory could be a solid hardening technique, but I'm not entirely sure if that's the best approach for volatile memory specifically.
upvoted 0 times
...
Elouise
15 days ago
Based on the details provided, I think memory encryption is the way to go. It should protect the confidentiality and integrity of the data stored in volatile memory, which seems to be the main concern the cloud provider is trying to address.
upvoted 0 times
...
Vilma
20 days ago
I'm a bit confused on the differences between the various hardening techniques. I'll need to review my notes on memory encryption, isolation, and secure boot to decide which one would be most appropriate here.
upvoted 0 times
...
Keena
25 days ago
Secure boot could be a good choice, but I'm not sure if that would fully address the risks to the volatile memory. Maybe a combination of techniques like memory encryption and secure boot would be the best approach.
upvoted 0 times
...
Jame
1 month ago
Hmm, I'm not sure about that. Wouldn't memory isolation or secure boot be a better option to address the specific concerns mentioned in the question?
upvoted 0 times
...
Rene
1 month ago
I think implementing memory encryption would be a good hardening technique to protect the confidentiality and integrity of the data.
upvoted 0 times
...

Save Cancel