Summer Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

Cybersecurity-Architecture-and-Engineering WGU Cybersecurity Architecture and Engineering (KFO1/D488) Questions and Answers

Questions 4

A consultancy organization has many employees who travel with different mobile devices. Having the employees visit an office to update their devices is not feasible due to their travel schedule.

How should the organization ensure that its employees receive the latest security updates?

Options:

A.

By providing remote module updates

B.

By providing tokenized container updates

C.

By providing mobile station updates

D.

By providing over-the-air updates

Buy Now
Questions 5

Which task is the responsibility of a database administrator?

Options:

A.

Installing and configuring databases

B.

Compiling code into an executable file

C.

Deciding on database applications for the company

D.

Troubleshooting network security issues

Buy Now
Questions 6

A company is preparing to test its disaster recovery plan, which includes procedures for restoringcritical systems in the event of a disruption. The company wants to conduct a test that is as close to a real disaster as possible without actually disrupting business operations.

Which disaster recovery test will meet the needs of the company?

Options:

A.

Walk-through test

B.

Parallel simulation test

C.

Full interruption test

D.

Tabletop exercise

Buy Now
Questions 7

A software development company is required to comply with the Payment Card Industry Data Security Standard (PCI DSS), which sets requirements for the protection of cardholder data. The company uses Secure Shell (SSH) to connect to its cloud-based development environment, which contains cardholder data.

Which security control will meet the needs of the company?

Options:

A.

Patch management

B.

Network segmentation

C.

Strong authentication

D.

Vulnerability analysis

Buy Now
Questions 8

Which risk management strategy will supplement privacy requirements for data on an electronic health record (EHR) system?

Options:

A.

Configuration of the system to disable universal serial bus (USB) ports on all workstations

B.

Encryption of all network traffic between the EHR system and external networks

C.

Implementation of role-based access controls and encryption of all sensitive data

D.

Implementation of a strict firewall policy to restrict access to the system's server

Buy Now
Questions 9

A small online retailer stores customer information, product inventory, and financial data on its local servers.

What are the necessary components of a business continuity and disaster recovery plan for this company?

Options:

A.

A detailed evacuation plan, frequent data backups, and regular cybersecurity training for employees

B.

Redundant backups, a communication plan, and a designated off-site location for data storage and recovery

C.

A comprehensive insurance policy, a list of emergency contacts, and a system for continuous monitoring of network activity

D.

Routine maintenance of servers, an emergency generator, and a policy for employees to work remotely in case of a disaster

Buy Now
Questions 10

An employee needs to execute a program from the command line.

Which peripheral device should be used?

Options:

A.

Keyboard

B.

Hard drive

C.

Speaker

D.

Printer

Buy Now
Questions 11

Which data type should be used to calculate 90% of the retail price of an item?

Options:

A.

Floating-point

B.

String

C.

Boolean

D.

Auto-number

Buy Now
Questions 12

When is it better to purchase software rather than build a software solution in-house?

Options:

A.

When the company has very specific needs

B.

When the company wants internal growth

C.

When there is a short timeline

D.

When the company wants to develop the skill sets of its internal IT staff

Buy Now
Questions 13

An organization wants to implement a new encryption solution to protect sensitive data stored in a database. The organization wants to ensure that the encryption solution provides strong protection for the data and is willing to sacrifice performance.

Which type of encryption meets the needs of the organization?

Options:

A.

Stream ciphers

B.

Asymmetric encryption

C.

Hash functions

D.

Block ciphers

Buy Now
Questions 14

Why should an information technology (IT) professional be aware of professional associations?

Options:

A.

Professional associations provide up-to-date training.

B.

Professional associations will ensure higher quality work.

C.

Professional associations upgrade the company's network.

D.

Professional associations give feedback to management.

Buy Now
Questions 15

A retail company wants to establish the frequency at which it needs to backup its critical data to ensure it can be restored in case of a disruption with the least amount of acceptable loss in recovery.

What is the term used to describe this metric?

Options:

A.

Continuous data protection (CDP)

B.

Business impact analysis (BIA)

C.

Disaster recovery (DR)

D.

Recovery point objective (RPO)

Buy Now
Questions 16

An IT team has been tasked with improving an organization's security posture to defend against potential malicious actors.

What is the first step when hunting for potential threats?

Options:

A.

Deploy an anti-malware solution

B.

Implement an intrusion detection system

C.

Form an incident response team

D.

Establish a baseline for normal activity

Buy Now
Questions 17

While undergoing a security audit, it is determined that an organization has several backup repositories hosted in the cloud without any level of protection.

Which action should be taken to protect the backup repositories first?

Options:

A.

Audit access logs

B.

Run a vulnerability scan

C.

Restrict access to the backups

D.

Disable the backup repositories

Buy Now
Questions 18

How do data support an organization's business goals?

Options:

A.

Data create opportunities to compete for potential customers.

B.

Data can be manipulated to support desired outcomes.

C.

Data provide information for business decisions.

D.

Data ensure an organization's business goals are met.

Buy Now
Questions 19

How does application software differ from operating systems?

Choose 2 answers

Options:

A.

Application software includes system utilities that run on demand of the user.

B.

Application software consists of programs that end users run to accomplish business or personal tasks, such as e-mail.

C.

Application software includes word processors and spreadsheet software that are useful to end users.

D.

Application software supports the computer hardware system directly.

Buy Now
Questions 20

What is one purpose of an End User License Agreement?

Options:

A.

Allow customers to legally create and sell a new version of the software

B.

Allow customers to legally use the software

C.

Allow customers to legally modify and compile the source code

D.

Allow customers to legally distribute the application to other users

Buy Now
Questions 21

A company has identified a potential risk associated with a new software implementation, which could result in a significant data breach.

Which step of the risk management life cycle involves implementing security controls to prevent the risk?

Options:

A.

Assess

B.

Identify

C.

Control

D.

Review

Buy Now
Questions 22

Management has asked its networking team to recommend a solution for direct communication between multiple virtual networks in the cloud. The solution must utilize the least amount of administrative effort.

Which solution meets the requirements?

Options:

A.

Virtual network peering

B.

Virtual local area network

C.

Remote Desktop Protocol

D.

Domain name system

Buy Now
Questions 23

An e-learning company uses Amazon Simple Storage Service (Amazon S3) to store e-books and video files that are served to customers through a custom application. The company has realized that someone has been stealing its intellectual property.

Which threat actor is most likely in this scenario?

Options:

A.

Advanced persistent threat

B.

Novice hacker

C.

Competitor

D.

Hacktivist

Buy Now
Questions 24

Which two benefits do computer networks provide for businesses?

Choose 2 answers

Options:

A.

Lower IT operations costs

B.

Improved information security

C.

Increased Internet communications speed

D.

Organization cost savings

E.

Increased business efficiency

Buy Now
Questions 25

A software development company uses file transfer protocol (FTP) to transfer software code between different teams.

Which security control is essential for protecting the integrity of software code that is transferred using FTP?

Options:

A.

Calculating and comparing the hash values of the software code before and after transfer using FTP can help detect any changes and ensure the integrity of the code.

B.

Implementing intrusion detection and prevention systems can help detect and prevent unauthorized access to the FTP server and software code.

C.

Enforcing strict access controls can limit the number of users with access to the FTP server and prevent unauthorized access.

D.

Regularly backing up the software code stored in the FTP server and having a disaster recovery plan can help ensure the integrity of the software code.

Buy Now
Questions 26

A company has recently completed its disaster recovery plan and is preparing to test it. The company’s IT team has identified the need to simulate a disaster scenario to evaluate the effectiveness of the plan. The team has considered a few options, including a full interruption test, a walk-through, tabletop exercises, and checklists. They want to choose a testing method that will allow them to evaluate the plan in a controlled environment while minimizing the impact on the company’s operations.

Which testing method will meet the needs of the company?

Options:

A.

Walk-through

B.

Tabletop exercises

C.

Checklists

D.

Full interruption test

Buy Now
Questions 27

Which block cipher mode of operation for encrypting data is simple and efficient and provides no confidentiality beyond that of the underlying block cipher?

Options:

A.

Electronic codebook (ECB)

B.

Cipher block chaining (CBC)

C.

Counter (CTR)

D.

Output feedback (OFB)

Buy Now
Questions 28

What is an information system?

Options:

A.

The hardware that allows human-computer interactions

B.

A database utility from a third party

C.

The computer hardware components

D.

A collection of data to support an organization

Buy Now
Questions 29

A large multinational corporation maintains a complex network of data centers across the world.

Which type of disaster recovery site will ensure business continuity in case of a disaster?

Options:

A.

A mobile data center that can be deployed to the disaster zone

B.

A fully equipped hot site with up-to-date hardware and software

C.

A secondary location with basic backup hardware and software

D.

A remote location with cloud-based backups

Buy Now
Questions 30

Which two languages are scripted?

Choose 2 answers

Options:

A.

Python

B.

Ada

C.

PHP

D.

C

Buy Now
Questions 31

Which part of the Uniform Resource Locator (URL) identifies the server on which the web page can be found?

Options:

A.

Resource path ID

B.

Domain name

C.

Protocol

D.

IP address

Buy Now
Questions 32

Match the legislative purpose with the corresponding legislation.

Answer options may be used more than once or not at all.

Cybersecurity-Architecture-and-Engineering Question 32

Options:

Buy Now
Questions 33

An IT team must allow on-premises users to log in to the Azure portal using their corporate credentials.

Which strategy should be used to enable identity federation in this scenario?

Options:

A.

Encrypting with Transport Layer Security (TLS)

B.

Deploying a hardware-based two-factor authentication (2FA) solution

C.

Integrating with lightweight directory access protocol (LDAP)

D.

Configuring third-party authentication with Security Assertion Markup Language (SAML)

Buy Now
Questions 34

Which type of communications media uses light waves to transmit data?

Options:

A.

Fiber optic

B.

Radio towers

C.

Twisted pair

D.

Coaxial

Buy Now
Questions 35

An organization's engineering team is developing a mobile application that uses near-field communication (NFC) capabilities but wants to ensure that information communicated using this protocol remains confidential.

Options:

A.

Kerberos centralized server for token and certificate management

B.

Bluetooth device honing restrictions for increased-risk transactions

C.

Portable device management (PDM) to allow only authorized protocols

D.

Encryption to prevent man-in-the-middle and eavesdropping attacks

Buy Now
Questions 36

A professional services organization deployed security edge devices in key locations on its corporate network.

How will these devices improve the organization's security posture?

Options:

A.

They act as an initial defense layer for potential threats

B.

They protect from severe distributed denial-of-service (DDoS) attacks

C.

They act as a security information and event management (SIEM) module for a security operations center (SOC) analyst

D.

They are a set of trusted platform module (TPM) devices

Buy Now
Questions 37

A healthcare organization would like to work with another healthcare organization without needing to maintain identified accounts for members of the other organization.

Which technology concept should the company use?

Options:

A.

Cloud identity provider

B.

Single sign-on (SSO)

C.

Multi-factor authentication (MFA)

D.

Federated authentication

Buy Now
Questions 38

Which system conversion method deploys the new system while the old system is still operational in order to compare output?

Options:

A.

Phased

B.

Direct

C.

Parallel

D.

Pilot

Buy Now
Questions 39

A security team has been informed that user data on the network has been compromised.

What is the first step the organization should take to respond to this data breach?

Options:

A.

Notify affected users of the incident

B.

Implement an access control policy

C.

Increase encryption levels

D.

Publicly announce the breach

Buy Now
Questions 40

Which risk management strategy will ensure the secure configuration and deployment of a new online banking system and help prevent credit card fraud?

Options:

A.

Implementation of real-time transaction monitoring

B.

Implementation of a strict firewall policy to restrict access to the system's server

C.

Configuration of the system to disable all email services on all workstations

D.

Use of regular system backups to an off-site location

Buy Now
Questions 41

A company recently updated its disaster recovery plan (DRP) to ensure business continuity in the event of a disruptive incident.

Which step will ensure the effectiveness of the DRP?

Options:

A.

Developing and implementing a testing plan for the DRP

B.

Reviewing and updating the DRP regularly to ensure it remains relevant

C.

Performing a risk assessment of the company's information assets

D.

Training employees on their roles and responsibilities during a disaster

Buy Now
Questions 42

A company wants to ensure that the integrity of its systems is maintained during the startup process.

Which security technology can ensure the integrity of the system during startup by verifying that the system has not been compromised?

Options:

A.

Two-factor authentication

B.

Intrusion detection system (IDS)

C.

Hardware security module (HSM)

D.

Measured boot

Buy Now
Questions 43

Why are businesses beginning to use big data?

Options:

A.

To store enormous amounts of paper documents and electronic data in databases and data warehouses for future analysis

B.

To collect large amounts of data from various sources, both external and internal, both paper and electronic

C.

To integrate vast amounts of electronic data into analysis in order to gain insight for better decision making

D.

To connect a myriad of devices to the Internet and allow these devices to logically interact with one another

Buy Now
Questions 44

A company has discovered a vulnerability in its lightweight directory access protocol (LDAP) implementation, which could potentially allow unauthorized access to sensitive information. The company has decided to implement risk mitigation strategies to reduce the risk associated with this vulnerability.

Which risk mitigation strategy will meet the needs of the company?

Options:

A.

Conducting regular security awareness training for employees to prevent social engineering attacks targeting LDAP credentials

B.

Regularly backing up data stored in the LDAP server to prevent data loss in the event of a breach

C.

Implementing intrusion detection and prevention systems (IDPS) to monitor for suspicious activities and potential LDAP attacks

D.

Implementing strong authentication mechanisms and encryption protocols to secure communication between the LDAP server and clients

Buy Now
Questions 45

The security team has been notified about multiple man-in-the-middle (MITM) attacks happening on the wireless network over the past thirty days. Management has agreed to upgrade the network infrastructure to help eliminate these attacks.

Which solution fulfills these requirements?

Options:

A.

Security information and event management (SIEM)

B.

Wireless intrusion prevention system (WIPS)

C.

Inline network encryptor

D.

Layer 3 switch

Buy Now
Questions 46

A company is moving its applications to the cloud and is concerned about cyber security threats. The security team has been tasked with providing a comprehensive view of how attackers gainaccess, move through networks, and carry out attacks.

Which framework identifies the seven phases of an attack, from initial infiltration to post-exploitation?

Options:

A.

Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) for industrial control systems (ICS)

B.

MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK)

C.

Cyber kill chain

D.

Diamond Model of Intrusion Analysis

Buy Now
Questions 47

Which risk management strategy will ensure that data stored on an enterprise resource planning (ERP) system is secure from exploitation in the event of a data breach?

Options:

A.

Enforcement of a strict firewall policy to restrict access to the ERP system's server

B.

Configuration of the ERP system to disable all printing services on all workstations

C.

Implementation of regular backup and disaster recovery planning

D.

Implementation of data encryption

Buy Now
Questions 48

The DevSecOps team for an organization manages a continuous integration and continuous deployment (CI/CD) pipeline for a three-tier web application. Management has asked the team toperform a series of comprehensive post-deployment tests to make sure that all of the components of the application can interact and function properly.

What should the team recommend?

Options:

A.

Static code analysis

B.

Dynamic code analysis

C.

Integration testing

D.

Package scanning

Buy Now
Questions 49

A company is developing a new system to process personal information about its customers, including their names, addresses, and purchase histories.

Which term describes the process of identifying and evaluating the potential effects that the new system may have on the privacy of personal information and developing strategies to mitigate those risks?

Options:

A.

Disaster recovery (DR)

B.

Business continuity planning (BCP)

C.

Data Protection Impact Assessment (DPIA)

D.

Risk management

Buy Now
Questions 50

The cybersecurity analyst at a hardware company conducted a vulnerability assessment to identify potential security risks to the organization and discovered multiple vulnerabilities on the company's webpage. The analyst then provided the results to the chief information security officer (CISO), who then decided to decommission the website and create a new page with increased security controls.

Which risk mitigation strategy is demonstrated in this scenario?

Options:

A.

Accept

B.

Avoid

C.

Transfer

D.

Mitigate

Buy Now
Exam Name: WGU Cybersecurity Architecture and Engineering (KFO1/D488)
Last Update: Jun 12, 2025
Questions: 232

PDF + Testing Engine

$66  $164.99

Testing Engine

$50  $124.99
buy now Cybersecurity-Architecture-and-Engineering testing engine

PDF (Q&A)

$42  $104.99
buy now Cybersecurity-Architecture-and-Engineering pdf