Which item facilitates communication between applications and databases?
A database driver is a software component that enables communication between an application and a database.
Function: It acts as a bridge, allowing applications to send queries to the database and retrieve results.
Types: Common database drivers include ODBC (Open Database Connectivity) and JDBC (Java Database Connectivity).
Reference
'Database System Concepts' by Abraham Silberschatz, Henry F. Korth, and S. Sudarshan
'Data Management for Researchers' by Kristin Briney
Top of Form
Which key exchange algorithm is based on advanced cryptography algorithms and is a more efficient alternative to traditional key exchange algorithms?
The correct answer is B --- Elliptic Curve Diffie-Hellman (ECDH).
WGU Cybersecurity Architecture and Engineering (KFO1 / D488) material highlights that ECDH is an enhanced, more efficient form of the traditional Diffie-Hellman key exchange, using elliptic curve cryptography (ECC). It provides similar security with much smaller key sizes, improving performance and efficiency.
DH (A) is the traditional method but is less efficient. RSA (C) is primarily used for encryption and digital signatures. DSA (D) is used for digital signatures, not for key exchange.
Reference Extract from Study Guide:
'Elliptic Curve Diffie-Hellman (ECDH) enhances traditional key exchange by utilizing elliptic curve cryptography, offering higher security with smaller key sizes and improved efficiency.'
--- WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Cryptographic Key Management
The security team has been tasked with selecting a password complexity policy for the organization.
Which password complexity policy option should be recommended?
The correct answer is B --- Sixteen characters with at least one letter, one number, and one symbol.
According to the WGU Cybersecurity Architecture and Engineering (KFO1 / D488) Study Guide, strong password policies must enforce a minimum length (preferably 12 to 16 characters) and require complexity, including uppercase and lowercase letters, numbers, and special characters. Sixteen-character passwords that include varied character types greatly increase the difficulty for attackers using brute-force or dictionary attacks.
Options A, C, and D either lack complexity or have too few characters, making them vulnerable to attacks.
Reference Extract from Study Guide:
'A strong password should be at least 12--16 characters long and include a mix of uppercase letters, lowercase letters, numbers, and special characters to maximize resistance to brute-force attacks.'
--- WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Identity and AccessManagement Concepts
=============================================
A cloud hosting provider is concerned about the potential risks associated with attacks that target the confidentiality and integrity of sensitive data stored on its servers' volatile memory. The provider has decided to implement hardening techniques and endpoint security controls to mitigate the risk.
Which hardening technique will meet the needs of this provider?
To protect datain use(within memory), the provider must implementhardware-level memory encryptionandtrusted execution environments(secure enclaves), which protect against cold boot attacks, memory scraping, and unauthorized access.
NIST SP 800-207A (Hardware-Enabled Security: Enclaves):
''Trusted execution environments and memory encryption mechanisms help ensure that data remains protected even when systems are compromised at lower levels.''
This is amodern cloud security best practiceespecially useful forconfidential computingenvironments.
WGU Course Alignment:
Domain:System Security Engineering / Cryptography
Topic:Protect data in use with hardware-based encryption and enclaves
What is a common characteristic of a proprietary software license?
Aproprietary software licensetypically grants a business or user theright to usethe software.
Unlike open-source licenses, proprietary licenses do not usually allow modification, redistribution, or reverse engineering.
The software remains the property of the company that created it, and the licensee is only granted specific, limited rights.
Examples:Many enterprise software applications come with proprietary licenses that specify the terms of use.
'Open Source Licensing: Software Freedom and Intellectual Property Law' by Lawrence Rosen.
'Proprietary Software Licenses Explained' from Software Engineering Institute.
Sarina
11 days agoLouvenia
18 days agoCherrie
25 days agoLashaun
1 month agoJulio
1 month agoPamella
2 months agoNguyet
2 months agoSelene
2 months agoRenea
2 months agoTerrilyn
3 months agoEun
3 months agoScot
3 months agoLenna
3 months agoLauna
4 months agoHoa
4 months agoTawny
4 months agoJeanice
4 months agoFrancisca
5 months agoBarrett
5 months agoAlaine
5 months ago