Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

Cybersecurity-Architecture-and-Engineering WGU Cybersecurity Architecture and Engineering (KFO1/D488) Questions and Answers

Questions 4

The security team has been notified about multiple man-in-the-middle (MITM) attacks happening on the wireless network over the past thirty days. Management has agreed to upgrade the network infrastructure to help eliminate these attacks.

Which solution fulfills these requirements?

Options:

A.

Security information and event management (SIEM)

B.

Wireless intrusion prevention system (WIPS)

C.

Inline network encryptor

D.

Layer 3 switch

Buy Now
Questions 5

A company is developing a new mobile application to support external customers and contractors. The application needs to allow users to sign in using third-party social identities.

What is the best protocol?

Options:

A.

Security Assertion Markup Language (SAML)

B.

Kerberos

C.

Lightweight Directory Access Protocol (LDAP)

D.

Open Authorization (OAuth)

Buy Now
Questions 6

A security analyst for a financial institution is in the process of planning to upgrade the institution’s IT infrastructure to meet current industry standards. There are various potential risks associated with the upgrade, including data breaches, system outages, and cost overruns. The analyst is tasked with managing these risks to ensure a successful upgrade.

What is the first step in the risk management life cycle in this scenario?

Options:

A.

Assess

B.

Control

C.

Review

D.

Identify

Buy Now
Questions 7

A software development company has experienced a noticeable slowdown in its network performance, which suggests that some machines on the network may have been infected by a botnet. The company has decided to analyze the threats and vulnerabilities within the enterprise based on the indicators of compromise to mitigate the risk.

What should the company do to detect a botnet and other malware-based threats within the enterprise based on the indicators of compromise?

Options:

A.

Use two-factor authentication for external users

B.

Define strict firewall rules

C.

Constantly scan for known signatures on every machine

D.

Implement a configuration management solution

Buy Now
Questions 8

A retail company wants to establish the frequency at which it needs to backup its critical data to ensure it can be restored in case of a disruption with the least amount of acceptable loss in recovery.

What is the term used to describe this metric?

Options:

A.

Continuous data protection (CDP)

B.

Business impact analysis (BIA)

C.

Disaster recovery (DR)

D.

Recovery point objective (RPO)

Buy Now
Questions 9

A company is developing a new system to process personal information about its customers, including their names, addresses, and purchase histories.

Which term describes the process of identifying and evaluating the potential effects that the new system may have on the privacy of personal information and developing strategies to mitigate those risks?

Options:

A.

Disaster recovery (DR)

B.

Business continuity planning (BCP)

C.

Data Protection Impact Assessment (DPIA)

D.

Risk management

Buy Now
Questions 10

What is one purpose of an End User License Agreement?

Options:

A.

Allow customers to legally create and sell a new version of the software

B.

Allow customers to legally use the software

C.

Allow customers to legally modify and compile the source code

D.

Allow customers to legally distribute the application to other users

Buy Now
Questions 11

A healthcare organization would like to interoperate with another healthcare organization without needing to maintain individual accounts for members of the other organization.

Which technology concept should the company use?

Options:

A.

Single Sign-On (SSO)

B.

Federated Authentication

C.

Multi-Factor Authentication (MFA)

D.

Cloud Identity Provider

Buy Now
Questions 12

A company may choose to use CDs, DVDs, hard drives, or even cloud storage for data backup.

Which aspect of data backup does this statement describe?

Options:

A.

Data mirroring

B.

Incremental backups

C.

Image backups

D.

Backup media

Buy Now
Questions 13

An IT organization needs to enable secure communication across virtual networks in Microsoft Azure and Amazon Web Services.

Which protocol will offer the most reliable and secure method for data transport?

Options:

A.

Transmission Control Protocol (TCP)

B.

Internet Protocol Security (IPsec)

C.

File Transfer Protocol (FTP)

D.

Secure Shell (SSH)

Buy Now
Questions 14

The security team manages a set of legacy firewalls that have been in production for nearly tenyears. The organization recently issued a mandate requiring that all firewalls be configured with intrusion detection controls that alert the team in real time based on known threats.

Options:

A.

Replacing the legacy firewalls with a security information and event management (SIEM) appliance

B.

Replacing the legacy firewalls with a reverse proxy

C.

Replacing the legacy firewalls with a load balancer

D.

Replacing the legacy firewalls with next-generation firewalls (NGFWs)

Buy Now
Questions 15

What signals the development of scope creep?

Options:

A.

Programmers are focused on a single feature.

B.

Many unplanned features have been added to the original project.

C.

The product does not satisfy all the requirements of the plan.

D.

An extension to the deadline of the project is requested.

Buy Now
Questions 16

Which encryption technique can be used to enable a third-party provider to perform calculations on encrypted data without decrypting the data?

Options:

A.

Homomorphic encryption

B.

Secure function evaluation (SFE)

C.

Secure Sockets Layer (SSL)

D.

Private information retrieval (PIR)

Buy Now
Questions 17

An employee needs to execute a program from the command line.

Which peripheral device should be used?

Options:

A.

Keyboard

B.

Hard drive

C.

Speaker

D.

Printer

Buy Now
Questions 18

A company has recently completed its disaster recovery plan and is preparing to test it. The company’s IT team has identified the need to simulate a disaster scenario to evaluate the effectiveness of the plan. The team has considered a few options, including a full interruption test, a walk-through, tabletop exercises, and checklists. They want to choose a testing method that will allow them to evaluate the plan in a controlled environment while minimizing the impact on the company’s operations.

Which testing method will meet the needs of the company?

Options:

A.

Walk-through

B.

Tabletop exercises

C.

Checklists

D.

Full interruption test

Buy Now
Questions 19

An IT organization recently implemented a hybrid cloud deployment. The security team must be able to correlate event data combined from different sources in a central location.

Options:

A.

Intrusion Detection System (IDS)

B.

File Integrity Monitoring (FIM)

C.

Security Information and Event Management (SIEM)

D.

Data Loss Prevention (DLP)

Buy Now
Questions 20

Which peripheral replaces the mouse on a mobile device?

Options:

A.

Stylus

B.

Jack

C.

Camera

D.

USB

Buy Now
Questions 21

A medium-sized grocery chain with locations all across the United States has a new business requirement that all devices must authenticate to access its resources.

What should the grocery chain use for the devices to authenticate?

Options:

A.

Virtual private network (VPN)

B.

Public key infrastructure (PKI)

C.

Certificate signing

D.

Endpoint passwords

Buy Now
Questions 22

An organization wants to securely transmit sensitive information between two parties. The organization wants to use a cryptographic technique that allows both parties to encrypt anddecrypt messages using the same key. The organization is also concerned about the performance impact of the encryption technique.

Which type of cryptographic algorithm meets the needs of the organization?

Options:

A.

Block cipher

B.

Hash function

C.

Symmetric algorithm

D.

Asymmetric algorithm

Buy Now
Questions 23

An organization sends customers e-mail messages based on their purchase patterns.

Which characteristic of quality data does this represent?

Options:

A.

Relevant

B.

Timely

C.

Thorough

D.

Accurate

Buy Now
Questions 24

A company has discovered a vulnerability in its Domain Name System (DNS) that could allow attackers to redirect users to malicious websites. The company has decided to implement a risk management strategy to mitigate this vulnerability.

What is the most effective risk management strategy for this vulnerability?

Options:

A.

Increasing the frequency of DNS server patching

B.

Conducting regular security awareness training for employees on the risks of phishing attacks

C.

Implementing Domain Name System Security Extensions (DNSSEC) to digitally sign DNS responses and prevent DNS spoofing attacks

D.

Restricting DNS access to trusted Internet Protocol (IP) addresses only

Buy Now
Questions 25

A company's website is suddenly redirecting users to a suspicious landing page asking for personal information.

What is the most likely cause of the issue?

Options:

A.

Exfiltration

B.

Phishing

C.

Tampering

D.

Ransomware

Buy Now
Questions 26

What does the following SQL statement produce when executed?

SELECT ‘ FROM Customers

WHERE State = ’Arizona';

Options:

A.

All of the records from the Customers table

B.

All of the records from the Customers database

C.

All of the records from the Customers database that are located in Arizona

D.

All of the records from the Customers table that are located in Arizona

Buy Now
Questions 27

Which statement best describes the purpose of a business intelligence (Bl) system?

Options:

A.

A Bl system allows access to raw data.

B.

A Bl system uses only proprietary data to maximize quality.

C.

A Bl system integrates all departments in an organization.

D.

A Bl system helps the strategic decision-making process.

Buy Now
Questions 28

The cybersecurity analyst at a hardware company conducted a vulnerability assessment to identify potential security risks to the organization and discovered multiple vulnerabilities on the company’s webpage. The analyst then provided the results to the Chief Information Security Officer (CISO), who then decided to decommission the website and create a new page with increased security controls.

Options:

A.

Transfer

B.

Accept

C.

Avoid

D.

Mitigate

Buy Now
Questions 29

A government agency is planning a hybrid cloud deployment. Strict controls must be in placethat can label classified data. The solution must ensure that access rights will be granted based on the user’s government security classification.

Options:

A.

Role-Based Access Control (RBAC)

B.

Mandatory Access Control (MAC)

C.

Attribute-Based Access Control (ABAC)

Buy Now
Questions 30

Which item is an input device?

Options:

A.

Printer

B.

Flash Drive

C.

CD

D.

Scanner

Buy Now
Questions 31

An e-learning company uses Amazon Simple Storage Service (Amazon S3) to store e-books and video files that are served to customers through a custom application. The company has realized that someone has been stealing its intellectual property.

Which threat actor is most likely in this scenario?

Options:

A.

Advanced persistent threat

B.

Novice hacker

C.

Competitor

D.

Hacktivist

Buy Now
Questions 32

A software development company is concerned about the potential risks associated with exploits that target vulnerabilities in the Linux operating system used by the company’s servers. Thecompany has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

Options:

A.

Enforcing strict access control policies for all users

B.

Implementing a host-based intrusion detection and prevention system

C.

Conducting regular security assessments and penetration testing

D.

Implementing shell restrictions

Buy Now
Questions 33

Why is business continuity planning essential?

Options:

A.

It ensures that the company will be profitable.

B.

It ensures that the company will avoid asset loss.

C.

It allows for succession planning.

D.

It allows for the quickest return to business operations.

Buy Now
Questions 34

What type of a system requirement involves preventing unauthorized access to data?

Options:

A.

Accessibility

B.

Design

C.

User needs

D.

Security

Buy Now
Questions 35

How do data support an organization's business goals?

Options:

A.

Data create opportunities to compete for potential customers.

B.

Data can be manipulated to support desired outcomes.

C.

Data provide information for business decisions.

D.

Data ensure an organization's business goals are met.

Buy Now
Questions 36

A cloud hosting provider is concerned about the potential risks associated with attacks that target the confidentiality and integrity of sensitive data stored on its servers' volatile storage. The provider has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this provider?

Options:

A.

Implementing secure encrypted enclaves and Advanced Micro Devices (AMD) Secure Memory Encryption

B.

Conducting regular security awareness training for all employees

C.

Implementing a next-generation antivirus system to detect and prevent malware attacks

D.

Enforcing a strong password complexity policy for all user accounts

Buy Now
Questions 37

A company has recently failed a security audit. Many of the end users have passwords older than 365 days.

Which password policy type will prevent this issue?

Options:

A.

Expiration

B.

Length

C.

Recovery

D.

Complexity

Buy Now
Questions 38

The security team has been tasked with selecting a password complexity policy for the organization.

Which password complexity policy option should be recommended?

Options:

A.

Twelve characters with no symbols or numbers

B.

Sixteen characters with at least one letter, one number, and one symbol

C.

Four characters with at least one letter or one number

D.

Eight characters with no symbols or numbers

Buy Now
Questions 39

A healthcare organization has experienced a ransomware attack that has resulted in the encryption of all patient medical records. The organization has backups, but restoring the data will take severaldays, and during that time, patient care will be significantly diminished.

What is the most important factor to consider when evaluating the severity of the ransomware attack?

Options:

A.

Threat actors

B.

Risk

C.

Impact

D.

Likelihood

Buy Now
Questions 40

A company is moving its applications to the cloud and is concerned about cyber security threats. The security team has been tasked with providing a comprehensive view of how attackers gainaccess, move through networks, and carry out attacks.

Which framework identifies the seven phases of an attack, from initial infiltration to post-exploitation?

Options:

A.

Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) for industrial control systems (ICS)

B.

MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK)

C.

Cyber kill chain

D.

Diamond Model of Intrusion Analysis

Buy Now
Questions 41

A security team is investigating multiple man-in-the-middle attacks that have taken place on the corporate network over the past few months. The team needs a solution that will ensure that data is not exposed if a man-in-the-middle attack occurs in the future.

What is the best solution?

Options:

A.

Disabling Wi-Fi connections

B.

Enforcing password history

C.

Encrypting data

D.

Ensuring all users have complex passwords

Buy Now
Questions 42

A large technology company has discovered a known vulnerability in its network infrastructure.The infrastructure contains a number of retired assets that are no longer receiving security updates, which could potentially be exploited by attackers to compromise the network. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

Options:

A.

Conducting regular vulnerability scans to identify potential weaknesses

B.

Implementing intrusion detection and prevention systems (IDPS)

C.

Enforcing strict access control policies for all network devices

D.

Removing all end-of-life devices from the network

Buy Now
Questions 43

A company recently updated its disaster recovery plan (DRP) to ensure business continuity in the event of a disruptive incident.

Which step will ensure the effectiveness of the DRP?

Options:

A.

Training employees on their roles and responsibilities during a disaster

B.

Performing a risk assessment of the company’s information assets

C.

Developing and implementing a testing plan for the DRP

D.

Reviewing and updating the DRP regularly to ensure it remains relevant

Buy Now
Questions 44

A retail company wants to establish the frequency at which it needs to back up its critical data to ensure it can be restored in case of a disruption with the least amount of acceptable data loss.

What is the term used to describe this metric?

Options:

A.

Business Impact Analysis (BIA)

B.

Continuous Data Protection (CDP)

C.

Recovery Point Objective (RPO)

D.

Disaster Recovery (DR)

Buy Now
Questions 45

Which risk management strategy will ensure the secure storage of data on a new document management system?

Options:

A.

Incorporation of a strict firewall policy to restrict access to the system’s server

B.

Configuration of the system to require frequent password changes

C.

Implementation of encryption for all data stored in the system

D.

Implementation of a secure Virtual Private Network (VPN) connection for all remote access to the system

Buy Now
Questions 46

What is an information system?

Options:

A.

The hardware that allows human-computer interactions

B.

A database utility from a third party

C.

The computer hardware components

D.

A collection of data to support an organization

Buy Now
Questions 47

A retail company has recently implemented a new point of sale (POS) system that is critical to its business.

Which security control is essential for protecting the availability of the POS system?

Options:

A.

Implementing intrusion detection and prevention systems can help detect and prevent unauthorized access to the POS system.

B.

Regularly backing up the data stored in the POS system and having a disaster recovery plan can help ensure that the system is available in the event of a security incident or system failure.

C.

Enforcing strict access controls can limit the number of users with access to the POS system and prevent unauthorized access.

D.

Regularly updating the POS system with the latest security patches can help prevent exploitation of known vulnerabilities and maintain the system's availability.

Buy Now
Questions 48

An IT organization recently implemented a hybrid cloud deployment. The security team must be able to correlate event data combined from different sources in a central location.

What is the best solution?

Options:

A.

File integrity monitoring (FIM)

B.

Data loss prevention (DLP)

C.

Intrusion detection system (IDS)

D.

Security information and event management (SIEM)

Buy Now
Questions 49

A company is concerned about the potential risks associated with unauthorized modifications to the Basic Input/Output System (BIOS) firmware on its servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which technique will prevent unauthorized modifications to the BIOS firmware on a server?

Options:

A.

Using an intrusion detection system to detect and prevent attacks

B.

BIOS protection

C.

BIOS monitoring

D.

Conducting regular backups of the server’s data

Buy Now
Questions 50

Which operation converts raw data into information?

Options:

A.

Input

B.

Output

C.

Storage

D.

Processing

Buy Now
Questions 51

A small online retailer stores customer information, product inventory, and financial data on its local servers.

What are the necessary components of a business continuity and disaster recovery plan for this company?

Options:

A.

A detailed evacuation plan, frequent data backups, and regular cybersecurity training for employees

B.

Redundant backups, a communication plan, and a designated off-site location for data storage and recovery

C.

A comprehensive insurance policy, a list of emergency contacts, and a system for continuous monitoring of network activity

D.

Routine maintenance of servers, an emergency generator, and a policy for employees to work remotely in case of a disaster

Buy Now
Questions 52

How does application software differ from operating systems?

Choose 2 answers

Options:

A.

Application software includes system utilities that run on demand of the user.

B.

Application software consists of programs that end users run to accomplish business or personal tasks, such as e-mail.

C.

Application software includes word processors and spreadsheet software that are useful to end users.

D.

Application software supports the computer hardware system directly.

Buy Now
Questions 53

A company has discovered a vulnerability in its domain name system (DNS) that could allow attackers to redirect users to malicious websites. The company has decided to implement a risk management strategy to mitigate this vulnerability.

What is the most effective risk management strategy for this vulnerability?

Options:

A.

Restricting DNS access to trusted internet protocol (IP) addresses only

B.

Implementing domain name system security extensions (DNSSEC) to digitally sign DNS responses and prevent DNS spoofing attacks

C.

Increasing the frequency of DNS server patching

D.

Conducting regular security awareness training for employees on the risks of phishing attacks

Buy Now
Questions 54

Which technique allows someone to obtain a password while it is in transit?

Options:

A.

Packet sniffing

B.

Buffer overflow

C.

Phishing

D.

Black hat

Buy Now
Questions 55

A company has recently experienced a data breach from an insider threat and wants to implement a policy to reduce the risk of similar incidents in the future. During the incident, the insider threat accessed sensitive information stored in the administrator account from their user account. The insider threat was not in a supervisory role at the time of the incident.

Which policy should the company implement?

Options:

A.

Password complexity policy

B.

Separation of duties

C.

Least privilege

D.

Job rotation

Buy Now
Questions 56

A healthcare organization is concerned about the potential risks associated with unauthorized access to sensitive patient information on its endpoint devices. The organization has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this organization?

Options:

A.

Enforcing strict password policies for all user accounts

B.

Conducting regular vulnerability assessments and penetration testing

C.

Implementing a network-based intrusion detection and prevention system

D.

Logging and monitoring endpoint devices

Buy Now
Questions 57

The security team manages a set of legacy firewalls that have been in production for nearly ten years. The organization recently issued a mandate requiring that all firewalls be configured with intrusion detection controls that alert the team in real time based on inbound threats.

Which solution meets these requirements?

Options:

A.

Replacing the legacy firewalls with a security information and event management (SIEM) appliance

B.

Replacing the legacy firewalls with a load balancer

C.

Replacing the legacy firewalls with next-generation firewalls (NGFWs)

D.

Replacing the legacy firewalls with a reverse proxy

Buy Now
Questions 58

A company wants to secure its computer systems and prevent any unauthorized access to its network. The company wants to implement a security solution that can restrict network traffic to only approved services and applications.

Which security technology will meet the needs of this company?

Options:

A.

Antivirus tools

B.

Two-factor authentication

C.

Host-based firewall

D.

Hardware security module (HSM)

Buy Now
Questions 59

Which risk management strategy will ensure the secure storage of data on a new document management system?

Options:

A.

Configuration of the system to require frequent password changes

B.

Incorporation of a strict firewall policy to restrict access to the system’s server

C.

Implementation of encryption for all data stored in the system

D.

Implementation of a secure virtual private network (VPN) connection for all remote access to the system

Buy Now
Questions 60

A professional services organization deployed security edge devices in key locations on its corporate network.

How will these devices improve the organization's security posture?

Options:

A.

They act as an initial defense layer for potential threats

B.

They protect from severe distributed denial-of-service (DDoS) attacks

C.

They act as a security information and event management (SIEM) module for a security operations center (SOC) analyst

D.

They are a set of trusted platform module (TPM) devices

Buy Now
Questions 61

An organization is experiencing multiple instances of attempted access from geographicallocations where there are no corporate offices or staff.

What should a network administrator do to prevent further access attempts?

Options:

A.

Adjust the rule sets within the Security Information and Event Manager (SIEM) tool

B.

Adjust the Domain Name Service (DNS) server A Records

C.

Adjust the main proxy server to only allow specific addresses

D.

Adjust the firewall configuration to drop traffic from these addresses

Buy Now
Questions 62

While undergoing a security audit, it is determined that an organization has several backup repositories nested in the cloud without any level of protection. Which action should be taken to protect the backup repositories first?

Options:

A.

Restrict access to the backups

B.

Run a vulnerability scan

C.

Disable the backup repositories

D.

Audit access logs

Buy Now
Questions 63

A cloud hosting provider is concerned about the potential risks associated with attacks that target the confidentiality and integrity of sensitive data stored on its servers’ volatile memory. The provider has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this provider?

Options:

A.

Implementing secure encrypted enclaves and AMD Secure Memory Encryption

B.

Enforcing a strong password complexity policy for all user accounts

C.

Implementing a next-generation antivirus system to detect and prevent malware attacks

D.

Conducting regular security awareness training for all employees

Buy Now
Questions 64

Which risk management strategy will help prevent cheating using a learning management system as a platform?

Options:

A.

Implementation of secure user authentication protocols

B.

Implementation of regular software updates and patch management

C.

Enforcement of a strict firewall policy to restrict access to the system’s server

D.

Configuration of the system to disable all Bluetooth services on all workstations

Buy Now
Questions 65

Which database has multiple tables with interrelated fields?

Options:

A.

Interrelated

B.

Hierarchical

C.

Flat file

D.

Relational

Buy Now
Questions 66

A security engineer has been asked to audit unapproved changes that have recently taken place in a corporate application.

Which logging mechanism will create an audit trail?

Options:

A.

NetFlow logs

B.

Access logs

C.

Packet capture logs

D.

Router logs

Buy Now
Questions 67

In which state is data considered information?

Options:

A.

Raw

B.

Input

C.

Unprocessed

D.

Processed

Buy Now
Questions 68

An engineer has noticed increased network traffic originating from an unknown internet protocol (IP) address.

Which action should be taken to analyze the unusual network traffic patterns?

Options:

A.

Permanently block all incoming traffic from the unknown IP address

B.

Compare the unknown address to known IP addresses to determine if it is a threat

C.

Temporarily block all incoming traffic from the unknown IP address

D.

Rate limit incoming traffic from the unknown IP address

Buy Now
Questions 69

What is scope creep?

Options:

A.

Realization that the organization staffing is inadequate

B.

The extent of the project that lacks needed requirements

C.

Small changes in a project that lead to bigger changes

D.

When the project is completed in less than the required time

Buy Now
Exam Name: WGU Cybersecurity Architecture and Engineering (KFO1/D488)
Last Update: Jun 15, 2025
Questions: 232
Cybersecurity-Architecture-and-Engineering pdf

Cybersecurity-Architecture-and-Engineering PDF

$29.75  $84.99
Cybersecurity-Architecture-and-Engineering Engine

Cybersecurity-Architecture-and-Engineering Testing Engine

$35  $99.99
Cybersecurity-Architecture-and-Engineering PDF + Engine

Cybersecurity-Architecture-and-Engineering PDF + Testing Engine

$47.25  $134.99