Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

Cybersecurity-Architecture-and-Engineering WGU Cybersecurity Architecture and Engineering (KFO1/D488) Questions and Answers

Questions 4

A corporate website is currently being redesigned, which leaves it vulnerable to security threats. Management does not want to provide an attacker with any information about the web server. Which strategy should be used to prevent an attacker from gaining unauthorized information?

Options:

A.

Obfuscating error messages on the site or within the Uniform Resource Locator (URL)

B.

Enabling Hypertext Transfer Protocol Secure (HTTPS) over Domain Name Service (DNS)

C.

Using HTTPS for all page and content requests

D.

Becoming PCI-DSS compliant and certified

Buy Now
Questions 5

Why is business continuity planning essential?

Options:

A.

It ensures that the company will be profitable.

B.

It ensures that the company will avoid asset loss.

C.

It allows for succession planning.

D.

It allows for the quickest return to business operations.

Buy Now
Questions 6

What is the role of the compiler?

Options:

A.

To take the most recent line of code, translate it, and execute the machine code

B.

To create an executable program by translating all of the code at one time

C.

To run scripting languages to test one line of code at a time

D.

To create executable code that is compatible with different operating systems

Buy Now
Questions 7

An IT organization has seen a surge of ransomware and Trojan horse attacks recently.

Which action should the security team recommend to protect the IT infrastructure from commodity malware threats?

Options:

A.

Installing a firewall to identify malicious traffic

B.

Rerouting suspicious communications to a remote machine

C.

Implementing a two-factor authentication system

D.

Installing endpoint protection software

Buy Now
Questions 8

A software company is reviewing its disaster recovery plan and wants to identify the criticality of its business processes to prioritize its recovery efforts.

Which will determine the criticality of its business processes?

Options:

A.

Business continuity planning (BCP)

B.

Business impact analysis (BIA)

C.

Disaster recovery (DR)

D.

Incident response (IR)

Buy Now
Questions 9

An IT organization has recently implemented a hybrid cloud deployment. The server team is deploying a new set of domain-joined Windows servers on cloud-based virtual machines. Users must be able to use their Active Directory credentials to sign in to applications regardless of whether they are running on Windows servers in the cloud or on-premises.

Which solution should be implemented to meet the requirements?

Options:

A.

Two-step verification

B.

Challenge-Handshake Authentication Protocol (CHAP)

C.

Privileged identity management

D.

Identity federation

Buy Now
Questions 10

An organization wants to ensure that its website is free of certain vulnerabilities before the final handoff to the client. What testing method should the organization use to inspect traffic and detect potential issues?

Options:

A.

HTTP interceptor

B.

Port scanner

C.

Bastion scanner

Buy Now
Questions 11

Which risk management strategy will ensure the secure configuration and deployment of a new supply chain management system and prevent identity theft?

Options:

A.

Use of a strict firewall policy to restrict access to the system’s server

B.

Configuration of the system to disable all universal serial bus (USB) ports on all workstations

C.

Implementation of regular vulnerability scans and patch management

D.

Implementation of multifactor authentication for all user accounts

Buy Now
Questions 12

A large multinational corporation maintains a complex network of data centers across the world.

Which type of disaster recovery site will ensure business continuity in case of a disaster?

Options:

A.

A mobile data center that can be deployed to the disaster zone

B.

A fully equipped hot site with up-to-date hardware and software

C.

A secondary location with basic backup hardware and software

D.

A remote location with cloud-based backups

Buy Now
Questions 13

Which system conversion method deploys the new system while the old system is still operational in order to compare output?

Options:

A.

Phased

B.

Direct

C.

Parallel

D.

Pilot

Buy Now
Questions 14

A healthcare organization is concerned about the potential risks associated with unauthorized access to sensitive patient information on its endpoint devices. The organization has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this organization?

Options:

A.

Enforcing strict password policies for all user accounts

B.

Conducting regular vulnerability assessments and penetration testing

C.

Implementing a network-based intrusion detection and prevention system

D.

Logging and monitoring endpoint devices

Buy Now
Questions 15

Which part of the Uniform Resource Locator (URL) identifies the server on which the web page can be found?

Options:

A.

Resource path ID

B.

Domain name

C.

Protocol

D.

IP address

Buy Now
Questions 16

A healthcare provider is developing a disaster recovery plan and wants to determine the longest duration that its systems or applications can be down before causing significant damage to the business.

What is the term used to describe this metric?

Options:

A.

Recovery time objective (RTO)

B.

Business impact analysis (BIA)

C.

Business continuity planning (BCP)

D.

Disaster recovery (DR)

Buy Now
Questions 17

During a vulnerability assessment, several end-of-life operating systems were discovered within the environment.

Which action should be taken to resolve the issue?

Options:

A.

Shut down and remove the end-of-life machines

B.

Disconnect the end-of-life machines

C.

Block the end-of-life machines

D.

Upgrade the remaining end-of-life machines

Buy Now
Questions 18

A retail company has recently implemented a new point of sale (POS) system that is critical to its business.

Which security control is essential for protecting the availability of the POS system?

Options:

A.

Backing up the data stored in the POS system and having a disaster recovery plan

B.

Regularly updating the POS system with the latest security patches

C.

Implementing intrusion detection and prevention systems

D.

Enforcing strict access controls on the POS system

Buy Now
Questions 19

Which action should an IT department take if an organization decides to expand its business by selling products online?

Options:

A.

Make sure the website can handle e-commerce transactions

B.

Ensure that the strategic goals aligned with the organization's mission statement

C.

Market the company’s products or services

D.

Manage capital to ensure a successful website

Buy Now
Questions 20

An organization wants to secure remote access to its servers and is looking for a secure protocol that can provide encryption and strong authentication. The organization wants to ensure that its servers can only be accessed by authorized users and that the data exchanged during the session is encrypted.

Which protocol meets the needs of the organization?

Options:

A.

Hypertext Transfer Protocol (HTTP)

B.

File Transfer Protocol (FTP)

C.

Telnet

D.

Secure Shell (SSH)

Buy Now
Questions 21

A cybersecurity analyst at a healthcare organization was tasked with analyzing the indicators of compromise (IOCs) to identify potential threats and vulnerabilities within the enterprise. Theanalyst notices unknown users logging on to the company's wireless local-area network (WLAN).

What is a potential vulnerability the healthcare organization is facing based on the IOCs identified?

Options:

A.

Unsecured wireless access points

B.

Up-to-date anti-malware software

C.

A strong password policy

D.

Regular security awareness training for employees

Buy Now
Questions 22

An employee needs to execute a program from the command line.

Which peripheral device should be used?

Options:

A.

Keyboard

B.

Hard drive

C.

Speaker

D.

Printer

Buy Now
Questions 23

A financial institution conducted a cybersecurity assessment, which identified several vulnerabilities, including outdated software and weak password policies. The company also needs to implement a new core banking system that can handle a large number of transactions while ensuring the security of customer data.

Which risk mitigation process is the most effective approach to address these vulnerabilities, and what is the best topology for the new core banking system?

Options:

A.

Creating strong password policies and enforcing multifactor authentication and using public cloud topology

B.

Implementing security patches and updates on a regular basis and using hybrid cloud topology

C.

Installing antivirus software on all endpoints and using on-premise topology

D.

Conducting regular security audits and penetration testing and using private cloud topology

Buy Now
Questions 24

A retail company has recently implemented a new point of sale (POS) system that is critical to its business.

Which security control is essential for protecting the availability of the POS system?

Options:

A.

Implementing intrusion detection and prevention systems can help detect and prevent unauthorized access to the POS system.

B.

Regularly backing up the data stored in the POS system and having a disaster recovery plan can help ensure that the system is available in the event of a security incident or system failure.

C.

Enforcing strict access controls can limit the number of users with access to the POS system and prevent unauthorized access.

D.

Regularly updating the POS system with the latest security patches can help prevent exploitation of known vulnerabilities and maintain the system's availability.

Buy Now
Questions 25

A healthcare organization is required to comply with the Health Insurance Portability and Accountability Act (HIPAA), which regulates the privacy and security of personal health information. The organization uses simple network management protocol (SNMP) to manage and monitor its network devices.

Which security control will protect the confidentiality of network device information within this organization?

Options:

A.

Access controls

B.

Network segmentation

C.

Encryption

D.

Security monitoring

Buy Now
Questions 26

Which motherboard component is used for short-term storage of data?

Options:

A.

Hard Drive

B.

BIOS

C.

Read Only Memory

D.

RAM

Buy Now
Questions 27

The security operations center (SOC) team has been alerted about malicious traffic on the corporate network and is concerned about a distributed denial of service (DDoS) attack. An analyst has been tasked with inspecting network traffic in the on-premises data center to investigate the issue.

Which type of file should the analyst use to inspect the traffic?

Options:

A.

Web server access log

B.

Syslog messages

C.

Operating system event log

D.

Packet capture

Buy Now
Questions 28

A company has recently experienced a data breach in which customer information was stolen. The company is concerned about the potential for future data breaches. A review of the incident revealed that the breach originated from stolen credentials.

Which security measure will meet the needs of this company?

Options:

A.

Implementing two-factor authentication

B.

Conducting background checks on employees

C.

Providing regular security awareness training to employees

D.

Installing a security information and event management (SIEM) system

Buy Now
Questions 29

A financial institution conducted a cybersecurity assessment, which identified several vulnerabilities including outdated software and weak password policies. The company also needs to implement a new core banking system that can handle a large number of transactions while ensuring the security of customer data.

Which risk mitigation process is the most effective approach to address these vulnerabilities, and what is the best topology for the new core banking system?

Options:

A.

Implementing security patches and updates on a regular basis and using hybrid cloud topology

B.

Installing antivirus software on all endpoints and using on-premises topology

C.

Creating strong password policies and enforcing multifactor authentication and using public cloud topology

D.

Conducting regular security audits and penetration testing and using private cloud topology

Buy Now
Questions 30

A company recently updated its disaster recovery plan (DRP) to ensure business continuity in the event of a disruptive incident.

Which step will ensure the effectiveness of the DRP?

Options:

A.

Developing and implementing a testing plan for the DRP

B.

Reviewing and updating the DRP regularly to ensure it remains relevant

C.

Performing a risk assessment of the company's information assets

D.

Training employees on their roles and responsibilities during a disaster

Buy Now
Questions 31

A retail company wants to establish the frequency at which it needs to backup its critical data to ensure it can be restored in case of a disruption with the least amount of acceptable loss in recovery.

What is the term used to describe this metric?

Options:

A.

Continuous data protection (CDP)

B.

Business impact analysis (BIA)

C.

Disaster recovery (DR)

D.

Recovery point objective (RPO)

Buy Now
Questions 32

A professional services organization deployed security edge devices in key locations on its corporate network.

How will these devices improve the organization’s security posture?

Options:

A.

They act as an initial defense layer for potential threats

B.

They are a set of Trusted Platform Module (TPM) devices

C.

They protect from severe Distributed Denial-of-Service (DDoS) attacks

D.

They act as a Security Information and Event Management (SIEM) module for a SOC analyst

Buy Now
Questions 33

An IT organization has recently implemented a hybrid cloud deployment. The server team is deploying a new set of domain-joined Windows servers on cloud-based virtual machines. Users must be able to use their Active Directory credentials to sign in to applications regardless of whether they are running on Windows servers in the cloud or on-premises.

Options:

A.

Identity federation

B.

Privileged identity management

C.

Challenge-Handshake Authentication Protocol (CHAP)

D.

Two-step verification

Buy Now
Questions 34

Which method is frequently used to protect software?

Options:

A.

Trademarks

B.

GNU General Public License

C.

Copyrights

D.

Fair use

Buy Now
Questions 35

A security engineer has been asked to audit unapproved changes that have recently taken place in a corporate application.

Which logging mechanism will create an audit trail?

Options:

A.

NetFlow logs

B.

Access logs

C.

Packet capture logs

D.

Router logs

Buy Now
Questions 36

A software development company uses file transfer protocol (FTP) to transfer software code between different teams.

Which security control is essential for protecting the integrity of software code that is transferred using FTP?

Options:

A.

Calculating and comparing the hash values of the software code before and after transfer using FTP can help detect any changes and ensure the integrity of the code.

B.

Implementing intrusion detection and prevention systems can help detect and prevent unauthorized access to the FTP server and software code.

C.

Enforcing strict access controls can limit the number of users with access to the FTP server and prevent unauthorized access.

D.

Regularly backing up the software code stored in the FTP server and having a disaster recovery plan can help ensure the integrity of the software code.

Buy Now
Questions 37

A government agency is planning a hybrid cloud deployment. Strict controls must be in place that can label classified data. The solution must ensure that access rights will be granted based on the user's government security classification.

Which type of access control should be used?

Options:

A.

Mandatory access control (MAC)

B.

Attribute-based access control (ABAC)

C.

Discretionary access control (DAC)

D.

Role-based access control (RBAC)

Buy Now
Questions 38

A financial institution is concerned about a potential data breach due to employees accessing the company network using personal devices. They have decided to implement a bring your own device (BYOD) policy to mitigate the risk.

Which risk mitigation strategy will reduce the risk of a data breach in this scenario?

Options:

A.

Blocking access to the company network from personal devices

B.

Conducting regular security audits of the company network

C.

Implementing a mobile device management (MDM) solution

D.

Providing security awareness training for employees

Buy Now
Questions 39

A financial services company is concerned about the potential risks associated with sensitive customer data stored on employee laptops. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

Options:

A.

Restricting user permissions for laptop software installation

B.

Implementing biometric authentication for laptop log-ins

C.

Implementing local drive encryption on employee laptops

D.

Conducting regular security awareness training for employees

Buy Now
Questions 40

What allows a user to query information from an online database with a web application without revealing what they are viewing?

Options:

A.

Private Information Retrieval (PIR)

B.

Homomorphic encryption

C.

Secure Function Evaluation (SFE)

D.

Private Function Evaluation (PFE)

Buy Now
Questions 41

Which item information should be stored in a database to determine an order total?

Options:

A.

Item order line

B.

Item unit price

C.

Item description

D.

Item restock levels

Buy Now
Questions 42

An IT organization needs to enable secure communication across virtual networks in Microsoft Azure and Amazon Web Services.

Which protocol will offer the most reliable and secure method for data transport?

Options:

A.

Transmission Control Protocol (TCP)

B.

Internet Protocol Security (IPsec)

C.

File Transfer Protocol (FTP)

D.

Secure Shell (SSH)

Buy Now
Questions 43

A company recently updated its disaster recovery plan (DRP) to ensure business continuity in the event of a disruptive incident.

Which step will ensure the effectiveness of the DRP?

Options:

A.

Training employees on their roles and responsibilities during a disaster

B.

Performing a risk assessment of the company’s information assets

C.

Developing and implementing a testing plan for the DRP

D.

Reviewing and updating the DRP regularly to ensure it remains relevant

Buy Now
Questions 44

A consultancy organization has many employees who travel with different mobile devices. Having the employees visit an office to update their devices is not feasible due to their travel schedule.

How should the organization ensure that its employees receive the latest security updates?

Options:

A.

By providing remote module updates

B.

By providing tokenized container updates

C.

By providing mobile station updates

D.

By providing over-the-air updates

Buy Now
Questions 45

A system analyst is reviewing risk documents and noticed that the date of many risks are more than three years old.

What should be proposed to leadership regarding these risks?

Options:

A.

A process to reassess risks on a defined schedule

B.

A process to confirm that risk documents are readily available to all individuals

C.

A process to evaluate how risks are captured on risk documents

D.

A process to determine how involved leadership is in assignment risk scores

Buy Now
Questions 46

Which algorithm is suitable for ensuring the integrity of digital documents and detecting any unauthorized modifications?

Options:

A.

Rivest–Shamir–Adleman (RSA)

B.

Data Encryption Standard (DES)

C.

Advanced Encryption Standard (AES)

D.

Secure Hash Algorithm 256 (SHA-256)

Buy Now
Questions 47

A company wants to ensure that the integrity of its systems is maintained during the startup process.

Which security technology can ensure the integrity of the system during startup by verifying that the system has not been compromised?

Options:

A.

Two-factor authentication

B.

Intrusion detection system (IDS)

C.

Hardware security module (HSM)

D.

Measured boot

Buy Now
Questions 48

An organization wants to implement a new encryption solution for a real-time video conferencing application. The organization wants to ensure that the encryption solution provides protection for the video stream without causing significant delays or latency in the conference.

Which type of encryption will meet the needs of the organization?

Options:

A.

Block ciphers

B.

Asymmetric encryption

C.

Stream ciphers

D.

Hash functions

Buy Now
Questions 49

A security analyst for a financial institution is in the process of planning to upgrade the institution’s IT infrastructure to meet current industry standards. There are various potential risks associated with the upgrade, including data breaches, system outages, and cost overruns. The analyst is tasked with managing these risks to ensure a successful upgrade.

What is the first step in the risk management life cycle in this scenario?

Options:

A.

Assess

B.

Control

C.

Review

D.

Identify

Buy Now
Questions 50

A company has identified a potential risk associated with a new software implementation, which could result in a significant data breach.

Which step of the risk management life cycle involves implementing security controls to prevent the risk?

Options:

A.

Assess

B.

Identify

C.

Control

D.

Review

Buy Now
Questions 51

The cybersecurity analyst at a hardware company conducted a vulnerability assessment to identify potential security risks to the organization and discovered multiple vulnerabilities on the company's webpage. The analyst then provided the results to the chief information security officer (CISO), who then decided to decommission the website and create a new page with increased security controls.

Which risk mitigation strategy is demonstrated in this scenario?

Options:

A.

Accept

B.

Avoid

C.

Transfer

D.

Mitigate

Buy Now
Questions 52

What signals the development of scope creep?

Options:

A.

Programmers are focused on a single feature.

B.

Many unplanned features have been added to the original project.

C.

The product does not satisfy all the requirements of the plan.

D.

An extension to the deadline of the project is requested.

Buy Now
Questions 53

A company may choose to use CDs, DVDs, hard drives, or even cloud storage for data backup.

Which aspect of data backup does this statement describe?

Options:

A.

Data mirroring

B.

Incremental backups

C.

Image backups

D.

Backup media

Buy Now
Questions 54

The security team has been notified about multiple man-in-the-middle (MITM) attacks happening on the wireless network over the past thirty days. Management has agreed to upgrade the network infrastructure to help eliminate these attacks.

Options:

A.

Security information and event management (SIEM)

B.

Inline network encryptor

C.

Layer 3 switch

D.

Wireless intrusion prevention system (WIPS)

Buy Now
Questions 55

An organization sends customers e-mail messages based on their purchase patterns.

Which characteristic of quality data does this represent?

Options:

A.

Relevant

B.

Timely

C.

Thorough

D.

Accurate

Buy Now
Questions 56

What is an information system?

Options:

A.

The hardware that allows human-computer interactions

B.

A database utility from a third party

C.

The computer hardware components

D.

A collection of data to support an organization

Buy Now
Questions 57

In which generation were computers first built with transistors?

Options:

A.

First generation

B.

Second generation

C.

Third generation

D.

Fourth generation

Buy Now
Questions 58

Which risk management strategy will ensure that data stored on an enterprise resource planning (ERP) system is secure from exploitation in the event of a data breach?

Options:

A.

Enforcement of a strict firewall policy to restrict access to the ERP system's server

B.

Configuration of the ERP system to disable all printing services on all workstations

C.

Implementation of regular backup and disaster recovery planning

D.

Implementation of data encryption

Buy Now
Questions 59

Which type of communications media uses light waves to transmit data?

Options:

A.

Fiber optic

B.

Radio towers

C.

Twisted pair

D.

Coaxial

Buy Now
Questions 60

A company is moving its applications to the cloud and is concerned about cyber security threats. The security team has been tasked with providing a comprehensive view of how attackers gainaccess, move through networks, and carry out attacks.

Which framework identifies the seven phases of an attack, from initial infiltration to post-exploitation?

Options:

A.

Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) for industrial control systems (ICS)

B.

MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK)

C.

Cyber kill chain

D.

Diamond Model of Intrusion Analysis

Buy Now
Questions 61

A company is looking to monitor and detect any suspicious activity on its servers. The company wants to implement a security solution that can detect any unauthorized access or unusual activity on the servers.

Which security technology will meet the needs of this company?

Options:

A.

Hardware security module (HSM)

B.

Two-factor authentication

C.

Antivirus tools

D.

Host-based intrusion detection system (HIDS)

Buy Now
Questions 62

An e-commerce company has recently experienced a data breach in which the personal and financial information of its customers was stolen. The company is concerned about the potential for future data breaches.

What is the most important factor to consider when evaluating the potential for future data breaches in this scenario?

Options:

A.

Impact

B.

Risk

C.

Threat actors

D.

Likelihood

Buy Now
Questions 63

Which task is the responsibility of a database administrator?

Options:

A.

Installing and configuring databases

B.

Compiling code into an executable file

C.

Deciding on database applications for the company

D.

Troubleshooting network security issues

Buy Now
Questions 64

A cybersecurity analyst at a manufacturing company is tasked with analyzing the indicators of compromise (IOCs) to identify potential threats and vulnerabilities within the organization. While viewing the security information and event management (SIEM), the analyst notices an unknown IP address logging on to the company's Secure Shell (SSH) server.

Which potential vulnerability is the manufacturing company facing?

Options:

A.

Exfiltration

B.

Unpatched software

C.

Enumeration

D.

Weak passwords

Buy Now
Questions 65

In which type of network topology are the networked devices connected to a central device like a hub or switch?

Options:

A.

Star

B.

Bus

C.

Mesh

D.

Ring

Buy Now
Questions 66

A company has recently experienced a data breach from an insider threat and wants to implement a policy to reduce the risk of similar incidents in the future. During the incident, the insider threat accessed sensitive information stored in the administrator account from their user account. The insider threat was not in a supervisory role at the time of the incident.

Which policy should the company implement?

Options:

A.

Password complexity policy

B.

Separation of duties

C.

Least privilege

D.

Job rotation

Buy Now
Questions 67

An organization's engineering team is developing a mobile application that uses near-field communication (NFC) capabilities but wants to ensure that information communicated using this protocol remains confidential.

Options:

A.

Kerberos centralized server for token and certificate management

B.

Bluetooth device honing restrictions for increased-risk transactions

C.

Portable device management (PDM) to allow only authorized protocols

D.

Encryption to prevent man-in-the-middle and eavesdropping attacks

Buy Now
Questions 68

An e-learning company uses Amazon Simple Storage Service (Amazon S3) to store e-books and video files that are served to customers through a custom application. The company has realized that someone has been stealing its intellectual property.

Which threat actor is most likely in this scenario?

Options:

A.

Advanced persistent threat

B.

Novice hacker

C.

Competitor

D.

Hacktivist

Buy Now
Questions 69

An organization's board of directors is reviewing the risk register and attempting to evaluate whether there is too much risk for the organization.

Which metric should the board review?

Options:

A.

Risk appetite

B.

Risk evaluation plan

C.

Risk treatment plan

D.

Risk tolerance

Buy Now
Exam Name: WGU Cybersecurity Architecture and Engineering (KFO1/D488)
Last Update: Jul 30, 2025
Questions: 232
Cybersecurity-Architecture-and-Engineering pdf

Cybersecurity-Architecture-and-Engineering PDF

$29.75  $84.99
Cybersecurity-Architecture-and-Engineering Engine

Cybersecurity-Architecture-and-Engineering Testing Engine

$35  $99.99
Cybersecurity-Architecture-and-Engineering PDF + Engine

Cybersecurity-Architecture-and-Engineering PDF + Testing Engine

$47.25  $134.99