{"id":113560,"date":"2023-08-16T02:04:07","date_gmt":"2023-08-16T02:04:07","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=113560"},"modified":"2023-08-16T02:04:09","modified_gmt":"2023-08-16T02:04:09","slug":"wgu-c795-exam-oa-real-exam-250-questions-and-correct-answers-wgu-795-cybersecurity-management-ii-tactical-oa-examverified-answersagrade","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/08\/16\/wgu-c795-exam-oa-real-exam-250-questions-and-correct-answers-wgu-795-cybersecurity-management-ii-tactical-oa-examverified-answersagrade\/","title":{"rendered":"WGU C795 EXAM OA REAL EXAM 250 QUESTIONS AND CORRECT ANSWERS\/WGU 795 CYBERSECURITY MANAGEMENT II TACTICAL OA EXAM(VERIFIED ANSWERS)|AGRADE"},"content":{"rendered":"\n<p>WGU C795 EXAM OA REAL EXAM 250 QUESTIONS AND<br>CORRECT ANSWERS\/WGU 795 CYBERSECURITY<br>MANAGEMENT II TACTICAL OA EXAM(VERIFIED<br>ANSWERS)|AGRADE<br>A web server is at near 100% utilization, and it is suggested that several web servers run the<br>same site, sharing traffic from the internet. Which system resilience method would this be?<br>Network load balancing<br>Failover clustering<br>Electronic vaulting<br>Remote journaling &#8211; ANSWER- Network load balancing<br>Which RAID array performs striping and uses mirroring for fault tolerance?<br>RAID 0<br>RAID 1<br>RAID 5<br>RAID 10 &#8211; ANSWER- RAID 10<br>Which kind of disaster recovery site typically consists of self-contained trailers?<br>Mobile<br>Hot<br>Warm<br>Cold &#8211; ANSWER- Mobile<br>How often should a BCP be reviewed?<br>At least annually or when changes occur<br>If and when the company gets audited<br>When a disaster occurs<br>Every 5 years or when a law changes &#8211; ANSWER- At least annually or when changes occur<br>Which database disaster recovery strategy transfers copies of database transaction logs to another<br>location?<\/p>\n\n\n\n<p>Electronic vaulting<br>Remote journaling<br>Disk Mirroring<br>Floating parity &#8211; ANSWER- Remote journaling<br>A company develops a BCP in addition to an emergency communication plan. What should be<br>included in the company&#8217;s emergency communication plan? Choose two<br>Alternate means of contact<br>Backup people for each role<br>The best time to call each person<br>Employee&#8217;s phone service providers &#8211; ANSWER- Alternate means of contact<br>Backup people for each role<br>Which type of backup solution should be incorporated in an organization that has high-capacity<br>backup data requirements in the terabytes?<br>Disk-to-disk<br>Tape<br>Optical media<br>High-capacity CD-RW &#8211; ANSWER- Disk-to-disk<br>Which data recovery strategy should be used to mitigate the risk of a natural disaster?<br>Perform a full local backup<br>store tapes in a secure room<br>Hold backups on a shared drive<br>Back up data to a remote cloud provider &#8211; ANSWER- Back up data to a remote cloud provider<br>Which two data recovery components will back up a file and change the archive bit to 0? Choose<br>two.<br>Full backup<br>Differential backup<br>Incremental backup<br>Copy backup &#8211; ANSWER- Full backup<br>Incremental backup<br>Disaster recovery team members are requested to do more than just review the disaster recovery<br>plan but not actually test the individual parts of the plan. Which type of test would suit this<br>request?<br>Read through<br>Structured walk through<br>Parallel<br>Full interruption &#8211; ANSWER- Structured walk through<\/p>\n\n\n\n<p>When should formal change management be used to manage updates to a DRP? &#8211; ANSWERWhen the IT infrastructure changes, all related disaster recovery documentation should be<br>changed to match the environment<br>A company presents team members with a disaster recovery scenario, asks members to develop<br>an appropriate response, and then tests some of the technical responses without shutting down<br>operations at the primary site. Which type of disaster recovery test is being performed?<br>Read-through<br>Structured walk through<br>Simulation<br>Full-interruption &#8211; ANSWER- Simulation<br>Which defense-in-depth practices allow an organization to locate an intruder on its internal<br>network?<br>Whitelisting applications and blacklisting processes<br>Antivirus and IPS<br>SIEM and IDS<br>Sandboxing applications and penetration testing &#8211; ANSWER- SIEM and IDS<br>A company is concerned that disgruntled employees are sending sensitive data to its competitors.<br>Which defense-in-depth practices assist a company in identifying an insider threat?<br>DLP and audit logs<br>Antivirus and IDS<br>DLP and IDS<br>Antivirus and audit logs &#8211; ANSWER- DLP and audit logs<br>A company is hit with a number of ransomeware attacks. These attacks are causing a significant<br>amount of downtime and data loss since users with access to sensitive company documents are<br>being targeted. These attacks have prompted management to invest in new technical controls to<br>prevent ransomware.<br>Which defense-in-depth practices should this company implement?<br>Password resets and a log review<br>Mandatory vacations and job rotation<br>Spam filtering and antimalware<br>Encryption and an internal firewall &#8211; ANSWER- Spam filtering and antimalware<br>A company&#8217;s database administrator requires access to a database server to perform maintenance.<br>The director of information technology will provide the database administrator access to the<br>database server but will not provide the database administrator access to all the data within the<br>server&#8217;s database.<\/p>\n\n\n\n<p>Which defense-in-depth practice enhances the company&#8217;s need-to-know data access strategy?<br>Using compartmented mode systems and least privilege<br>Using compartmented mode systems and two-person control<br>Using dedicated mode systems and least privilege<br>Using dedicated mode systems and two-person control &#8211; ANSWER- Using compartmented mode<br>systems and least privilege<br>A company has signed a contract with third party vendor to use the vendor&#8217;s inventory<br>management system hosted in a cloud. For convince, the vendor set up the application to use<br>LDAP queries but did not enable secure LDAP queries or implement a SSL on the application&#8217;s<br>web server. The vendor does not have the ability to secure the system, and company<br>management insists on using the application. Which defense-in-depth practices should the<br>company implement to minimize the likelihood of an account compromise due to insecure setup<br>by the vendor?<br>Location-based access control and multifactor authentication<br>IPS and honeypot systems<br>Antivirus and IDS<br>Password hashing and authentication encryption &#8211; ANSWER- Location-based access control and<br>multifactor authentication<br>A company is terminating several employees with high levels of access. The company wants to<br>protect itself from possible disgruntled employees who could become potential insider threats.<br>Which defense-in-depth practices should be applied?<br>Account revocation and conducting a vulnerability assessment<br>Account revocation and conducting a full backup of critical data<br>A mandatory 90-day password change and conducting a full backup of critical data<br>A mandatory 90-day password change and conducting a vulnerability assessment &#8211; ANSWERAccount revocation and conducting a vulnerability assessment<br>A hacker is sitting between a corporate user and the email server that the user is currently<br>accessing. The hacker is trying to intercept and capture any data the user is sending through the<br>email application. How should a system administrator protect the company&#8217;s email server from<br>this attack?<br>Encrypt network traffic with VPNs<br>Add antimalware to the email server<br>Implement a firewall<br>Whitelist the sites the are trusted &#8211; ANSWER- Encrypt network traffic with VPNs<br>A company wants to prevent cybercriminals from gaining easy access into its email server. The<br>company wants to know which user is accessing which resources and to prevent hackers from<br>easily gaining access to the server. Which defense-in-depth strategy should be used?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>WGU C795 EXAM OA REAL EXAM 250 QUESTIONS ANDCORRECT ANSWERS\/WGU 795 CYBERSECURITYMANAGEMENT II TACTICAL OA EXAM(VERIFIEDANSWERS)|AGRADEA web server is at near 100% utilization, and it is suggested that several web servers run thesame site, sharing traffic from the internet. Which system resilience method would this be?Network load balancingFailover clusteringElectronic vaultingRemote journaling &#8211; ANSWER- Network load [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-113560","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/113560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=113560"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/113560\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=113560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=113560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=113560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}