Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Exam Cybersecurity-Architecture-and-Engineering All Questions
Exam Cybersecurity-Architecture-and-Engineering All Questions

View all questions & answers for the Cybersecurity-Architecture-and-Engineering exam

WGU Courses and Certificates Cybersecurity-Architecture-and-Engineering Question # 26 Topic 3 Discussion

Cybersecurity-Architecture-and-Engineering Exam Topic 3 Question 26 Discussion:
Question #: 26
Topic #: 3

A software development company uses file transfer protocol (FTP) to transfer software code between different teams.

Which security control is essential for protecting the integrity of software code that is transferred using FTP?


A.

Calculating and comparing the hash values of the software code before and after transfer using FTP can help detect any changes and ensure the integrity of the code.


B.

Implementing intrusion detection and prevention systems can help detect and prevent unauthorized access to the FTP server and software code.


C.

Enforcing strict access controls can limit the number of users with access to the FTP server and prevent unauthorized access.


D.

Regularly backing up the software code stored in the FTP server and having a disaster recovery plan can help ensure the integrity of the software code.


Get Premium Cybersecurity-Architecture-and-Engineering Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.