A cloud hosting provider is concerned about the potential risks associated with attacks that target the confidentiality and integrity of sensitive data stored on its servers' volatile memory. The provider has decided to implement hardening techniques and endpoint security controls to mitigate the risk.
Which hardening technique will meet the needs of this provider?
To protect datain use(within memory), the provider must implementhardware-level memory encryptionandtrusted execution environments(secure enclaves), which protect against cold boot attacks, memory scraping, and unauthorized access.
NIST SP 800-207A (Hardware-Enabled Security: Enclaves):
''Trusted execution environments and memory encryption mechanisms help ensure that data remains protected even when systems are compromised at lower levels.''
This is amodern cloud security best practiceespecially useful forconfidential computingenvironments.
WGU Course Alignment:
Domain:System Security Engineering / Cryptography
Topic:Protect data in use with hardware-based encryption and enclaves
What is a common characteristic of a proprietary software license?
Aproprietary software licensetypically grants a business or user theright to usethe software.
Unlike open-source licenses, proprietary licenses do not usually allow modification, redistribution, or reverse engineering.
The software remains the property of the company that created it, and the licensee is only granted specific, limited rights.
Examples:Many enterprise software applications come with proprietary licenses that specify the terms of use.
'Open Source Licensing: Software Freedom and Intellectual Property Law' by Lawrence Rosen.
'Proprietary Software Licenses Explained' from Software Engineering Institute.
In which generation were computers first built with transistors?
The second generation of computers (1956-1963) saw the introduction of transistors, which replaced vacuum tubes used in the first generation. Transistors allowed computers to be smaller, faster, more reliable, and more energy-efficient compared to their predecessors.
Which risk management strategy will help prevent cheating using a learning management system as a platform?
The correct answer is C --- Implementation of secure user authentication protocols.
WGU Cybersecurity Architecture and Engineering (KFO1 / D488) emphasizes that secure authentication mechanisms, like strong passwords, multifactor authentication, and session management, prevent unauthorized access and impersonation, thus helping prevent cheating inlearning platforms.
Firewall policies (A) and disabling Bluetooth (B) harden systems but do not directly address authentication. Software updates (D) protect against system vulnerabilities but not user integrity.
Reference Extract from Study Guide:
'Secure authentication protocols ensure that users accessing learning management systems are properly verified, reducing risks of impersonation and cheating.'
--- WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Secure Access Control and Identity Verification
=============================================
Which risk management strategy will ensure the secure storage of data on a new document management system?
Encrypting stored (at rest) dataensures that even if the storage is compromised (e.g., stolen or accessed by unauthorized parties), the data remains unintelligible without the encryption keys.
NIST SP 800-111 (Guide to Storage Encryption Technologies):
''Data encryption provides confidentiality of information stored on media or storage systems, preventing unauthorized disclosure of sensitive data.''
Encryption is a core requirement forconfidentiality controls, especially for systems handling documents and records.
WGU Course Alignment:
Domain:System Security Engineering
Topic:Apply data-at-rest encryption for secure information storage
Pamella
8 days agoNguyet
15 days agoSelene
22 days agoRenea
30 days agoTerrilyn
1 month agoEun
1 month agoScot
2 months agoLenna
2 months agoLauna
2 months agoHoa
2 months agoTawny
3 months agoJeanice
3 months agoFrancisca
3 months agoBarrett
3 months agoAlaine
4 months ago