Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

Cybersecurity-Architecture-and-Engineering WGU Cybersecurity Architecture and Engineering (KFO1/D488) Questions and Answers

Questions 4

A company is concerned about the potential risks associated with unauthorized modifications to the basic input/output system (BIOS) firmware on its servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which technique will prevent unauthorized modifications to the BIOS firmware on a server?

Options:

A.

BIOS monitoring

B.

Using an intrusion detection system to detect and prevent attacks

C.

Conducting regular backups of the server's data

D.

BIOS protection

Buy Now
Questions 5

The DevSecOps team for an organization manages a continuous integration and continuous deployment (CI/CD) pipeline for a three-tier web application. Management has asked the team toperform a series of comprehensive post-deployment tests to make sure that all of the components of the application can interact and function properly.

What should the team recommend?

Options:

A.

Static code analysis

B.

Dynamic code analysis

C.

Integration testing

D.

Package scanning

Buy Now
Questions 6

An organization wants to secure remote access to its servers and is looking for a secure protocol that can provide encryption and strong authentication. The organization wants to ensure that its servers can only be accessed by authorized users and that the data exchanged during the session is encrypted.

Which protocol meets the needs of the organization?

Options:

A.

Hypertext Transfer Protocol (HTTP)

B.

File Transfer Protocol (FTP)

C.

Telnet

D.

Secure Shell (SSH)

Buy Now
Questions 7

The security operations center (SOC) team has been alerted about malicious traffic on the corporate network and is concerned about a distributed denial of service (DDoS) attack. An analyst has been tasked with inspecting network traffic in the on-premises data center to investigate the issue.

Which type of file should the analyst use to inspect the traffic?

Options:

A.

Web server access log

B.

Syslog messages

C.

Operating system event log

D.

Packet capture

Buy Now
Questions 8

Which operation converts raw data into information?

Options:

A.

Input

B.

Output

C.

Storage

D.

Processing

Buy Now
Questions 9

A healthcare provider is required to comply with the Health Insurance Portability and Accountability Act (HIPAA), which sets requirements for the protection of patient healthinformation. The provider uses various software applications to manage and store patient health information, which must be coded to protect its confidentiality and integrity.

Which protocol will meet the needs of this provider?

Options:

A.

Wired Equivalent Privacy (WEP)

B.

Advanced Encryption Standard (AES)

C.

Simple Mail Transfer Protocol (SMTP)

D.

Rivest-Shamir-Adleman (RSA)

Buy Now
Questions 10

The security team has been notified about multiple man-in-the-middle (MITM) attacks happening on the wireless network over the past thirty days. Management has agreed to upgrade the network infrastructure to help eliminate these attacks.

Which solution fulfills these requirements?

Options:

A.

Security information and event management (SIEM)

B.

Wireless intrusion prevention system (WIPS)

C.

Inline network encryptor

D.

Layer 3 switch

Buy Now
Questions 11

Which risk management strategy will supplement privacy requirements for data on an electronic health record (EHR) system?

Options:

A.

Configuration of the system to disable universal serial bus (USB) ports on all workstations

B.

Encryption of all network traffic between the EHR system and external networks

C.

Implementation of role-based access controls and encryption of all sensitive data

D.

Implementation of a strict firewall policy to restrict access to the system's server

Buy Now
Questions 12

What are three operating systems that are commonly used today?

Choose 3 answers

Options:

A.

Microsoft Outlook

B.

Mac OS

C.

Linux

D.

MySQL

E.

Microsoft Windows

F.

Mozilla Firefox

Buy Now
Questions 13

A software company is reviewing its disaster recovery plan and wants to identify the criticality of its business processes to prioritize its recovery efforts.

Which will determine the criticality of its business processes?

Options:

A.

Business continuity planning (BCP)

B.

Business impact analysis (BIA)

C.

Disaster recovery (DR)

D.

Incident response (IR)

Buy Now
Questions 14

A healthcare organization is required to comply with the Health Insurance Portability and Accountability Act (HIPAA), which regulates the privacy and security of personal health information. The organization uses simple network management protocol (SNMP) to manage and monitor its network devices.

Which security control will protect the confidentiality of network device information within this organization?

Options:

A.

Access controls

B.

Network segmentation

C.

Encryption

D.

Security monitoring

Buy Now
Questions 15

A security analyst for a financial institution is in the process of planning to upgrade the institution’s IT infrastructure to meet current industry standards. There are various potential risks associated with the upgrade, including data breaches, system outages, and cost overruns. The analyst is tasked with managing these risks to ensure a successful upgrade.

What is the first step in the risk management life cycle in this scenario?

Options:

A.

Assess

B.

Control

C.

Review

D.

Identify

Buy Now
Questions 16

What is a characteristic of algorithms?

Options:

A.

No starting or stopping point

B.

Random instructions

C.

Unambiguous rules

D.

Constantly changing

Buy Now
Questions 17

A financial institution conducted a cybersecurity assessment, which identified several vulnerabilities, including outdated software and weak password policies. The company also needs to implement a new core banking system that can handle a large number of transactions while ensuring the security of customer data.

Which risk mitigation process is the most effective approach to address these vulnerabilities, and what is the best topology for the new core banking system?

Options:

A.

Creating strong password policies and enforcing multifactor authentication and using public cloud topology

B.

Implementing security patches and updates on a regular basis and using hybrid cloud topology

C.

Installing antivirus software on all endpoints and using on-premise topology

D.

Conducting regular security audits and penetration testing and using private cloud topology

Buy Now
Questions 18

Which IT role is responsible for installing new hardware and troubleshooting existing hardware?

Options:

A.

Web administrator

B.

System administrator

C.

Security administrator

D.

Network administrator

Buy Now
Questions 19

An organization needs to securely exchange confidential documents with a third-party vendor overan unsecured network connection. The organization wants to ensure that the documents can only be read by the intended recipient and cannot be intercepted or read by unauthorized parties.

Which type of encryption meets the needs of the organization?

Options:

A.

Stream ciphers

B.

Asymmetric encryption

C.

Block ciphers

D.

Hash functions

Buy Now
Questions 20

What is the correct order of project phases?

Options:

A.

1)Initiation2)Executing3)Planning4)Monitoring and Controllings) Closing

B.

1) Planning2) InitiationAMonitoring and Controlling4) Executings) Closing

C.

1) Executing2) Monitoring and Controlling3) Initiation4) Planning5) Closing

D.

1) Initiation2) Planning° 3) Executing4) Monitoring and Controllings) Closing

Buy Now
Questions 21

When is it better to purchase software rather than build a software solution in-house?

Options:

A.

When the company has very specific needs

B.

When the company wants internal growth

C.

When there is a short timeline

D.

When the company wants to develop the skill sets of its internal IT staff

Buy Now
Questions 22

What type of a system requirement involves preventing unauthorized access to data?

Options:

A.

Accessibility

B.

Design

C.

User needs

D.

Security

Buy Now
Questions 23

A company has recently experienced a data breach from an insider threat and wants to implement a policy to reduce the risk of similar incidents in the future. During the incident, the insider threat accessed sensitive information stored in the administrator account from their user account. The insider threat was not in a supervisory role at the time of the incident.

Which policy should the company implement?

Options:

A.

Password complexity policy

B.

Separation of duties

C.

Least privilege

D.

Job rotation

Buy Now
Questions 24

Which software allows the user to easily access the hardware of a computer?

Options:

A.

Productivity

B.

FTP client

C.

Application

D.

Operating system

Buy Now
Questions 25

In which type of network topology are the networked devices connected to a central device like a hub or switch?

Options:

A.

Star

B.

Bus

C.

Mesh

D.

Ring

Buy Now
Questions 26

Which algorithm is suitable for ensuring the integrity of digital documents and detecting any unauthorized modifications?

Options:

A.

Data Encryption Standard (DES)

B.

Secure Hash Algorithm 256 (SHA-256)

C.

Advanced Encryption Standard (AES)

D.

Rivest-Shamir-Adleman (RSA)

Buy Now
Questions 27

A healthcare organization would like to work with another healthcare organization without needing to maintain identified accounts for members of the other organization.

Which technology concept should the company use?

Options:

A.

Cloud identity provider

B.

Single sign-on (SSO)

C.

Multi-factor authentication (MFA)

D.

Federated authentication

Buy Now
Questions 28

A company is concerned about advanced persistent threats and wants to implement a security solution that can detect any unusual actions. The company wants to analyze the actions and trends of users and entities to identify any potential security risks.

Which security technology meets the needs of the company?

Options:

A.

User and entity behavior analytics (UEBA)

B.

Hardware security module (HSM)

C.

Antivirus tools

D.

Two-factor authentication

Buy Now
Questions 29

A software development company has experienced a noticeable slowdown in its network performance, which suggests that some machines on the network may have been infected by a botnet. The company has decided to analyze the threats and vulnerabilities within the enterprise based on the indicators of compromise to mitigate the risk.

What should the company do to detect a botnet and other malware-based threats within the enterprise based on the indicators of compromise?

Options:

A.

Use two-factor authentication for external users

B.

Define strict firewall rules

C.

Constantly scan for known signatures on every machine

D.

Implement a configuration management solution

Buy Now
Questions 30

Which security technique should be used to prevent data exfiltration?

Options:

A.

Multi-factor authentication (MFA)

B.

Intrusion detection software (IDS)

C.

Data loss prevention (DLP)

D.

Intrusion prevention software (IPS)

Buy Now
Questions 31

An application team manages a large farm of web servers on virtual machines in the cloud. The team wants to reduce the server load by caching static content. Adding a second layer of protection is also a requirement.

What should this team recommend in this scenario?

Options:

A.

Firewall rule changes

B.

Intrusion detection system (IDS)

C.

Reverse proxy

D.

Network address translation (NAT)

Buy Now
Questions 32

Which IT department goal would support business goals?

Options:

A.

Overseeing funds flowing through the organization

B.

Developing an online shopping cart for company products

C.

Promoting the company's products and services

D.

Interviewing applicants for marketing positions

Buy Now
Questions 33

Which two benefits do computer networks provide for businesses?

Choose 2 answers

Options:

A.

Lower IT operations costs

B.

Improved information security

C.

Increased Internet communications speed

D.

Organization cost savings

E.

Increased business efficiency

Buy Now
Questions 34

What is the role of the CPU in a computing environment?

Choose 2 answers

Options:

A.

Carrying out the instructions of a computer program

B.

Storing data as it is being processed

C.

Directing electrical current over the circuit board

D.

Connecting components to the system unit

E.

Containing an arithmetic logic unit (ALU) that performs arithmetic and logic operations

Buy Now
Questions 35

Which stream cipher is a variant of the Salsa20 cipher, designed to be fast, secure, and resistant to cryptanalysis, and is commonly used in combination with the Poly1305 authentication mode?

Options:

A.

Counter (CTR)

B.

Cipher block chaining (CBC)

C.

ChaCha

D.

Electronic codebook (ECB)

Buy Now
Questions 36

A company is moving its applications to the cloud and is concerned about cyber security threats. The security team has been tasked with providing a comprehensive view of how attackers gainaccess, move through networks, and carry out attacks.

Which framework identifies the seven phases of an attack, from initial infiltration to post-exploitation?

Options:

A.

Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) for industrial control systems (ICS)

B.

MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK)

C.

Cyber kill chain

D.

Diamond Model of Intrusion Analysis

Buy Now
Questions 37

Which characteristic identifies intranet application software?

Options:

A.

Hosted by an outsourced provider

B.

Hosted in the internal business network

C.

Hosted by a third-party web portal

D.

Hosted on an individual computer

Buy Now
Questions 38

A company is developing a new mobile application to support external customers and contractors. The application needs to allow users to sign in using third-party social identities.

What is the best protocol?

Options:

A.

Security Assertion Markup Language (SAML)

B.

Kerberos

C.

Lightweight Directory Access Protocol (LDAP)

D.

Open Authorization (OAuth)

Buy Now
Questions 39

How should a security analyst detect a potential structured query language (SQL) injection attack?

Options:

A.

By looking for extra and unexpected symbols and characters in certain queries

B.

By looking for database primary key changes on the production environment

C.

By looking for repeated failed login attempts to the database server

D.

By looking for administrative command attempts within database log files

Buy Now
Questions 40

Which task is the responsibility of a database administrator?

Options:

A.

Installing and configuring databases

B.

Compiling code into an executable file

C.

Deciding on database applications for the company

D.

Troubleshooting network security issues

Buy Now
Questions 41

What are two differences between a handheld computer and a desktop?

Choose 2 answers.

Options:

A.

A handheld has more memory.

B.

A desktop has more memory.

C.

A desktop has more internal storage.

D.

A handheld has more internal storage.

Buy Now
Questions 42

A company wants to secure its computer systems and prevent any unauthorized access to its network. The company wants to implement a security solution that can restrict network traffic to only approved services and applications.

Which security technology will meet the needs of this company?

Options:

A.

Antivirus tools

B.

Two-factor authentication

C.

Host-based firewall

D.

Hardware security module (HSM)

Buy Now
Questions 43

An IT organization has recently migrated its servers to the cloud. The security team needs to delegate administrative control of multiple cloud services to various administrators inside the company. This team needs a granular solution that will offer the most flexibility while maintaining a secure posture.

What is the best solution?

Options:

A.

Open Authorization (OAuth)

B.

Security Assertion Markup Language (SAML)

C.

Role-based access control (RBAC)

D.

Kerberos

Buy Now
Questions 44

An IT organization needs to enable secure communication across virtual networks in Microsoft Azure and Amazon Web Services.

Which protocol will offer the most reliable and secure method for data transport?

Options:

A.

Transmission Control Protocol (TCP)

B.

Internet Protocol Security (IPsec)

C.

File Transfer Protocol (FTP)

D.

Secure Shell (SSH)

Buy Now
Questions 45

A small online retailer stores customer information, product inventory, and financial data on its local servers.

What are the necessary components of a business continuity and disaster recovery plan for this company?

Options:

A.

A detailed evacuation plan, frequent data backups, and regular cybersecurity training for employees

B.

Redundant backups, a communication plan, and a designated off-site location for data storage and recovery

C.

A comprehensive insurance policy, a list of emergency contacts, and a system for continuous monitoring of network activity

D.

Routine maintenance of servers, an emergency generator, and a policy for employees to work remotely in case of a disaster

Buy Now
Questions 46

Why is business continuity planning essential?

Options:

A.

It ensures that the company will be profitable.

B.

It ensures that the company will avoid asset loss.

C.

It allows for succession planning.

D.

It allows for the quickest return to business operations.

Buy Now
Questions 47

What signals the development of scope creep?

Options:

A.

Programmers are focused on a single feature.

B.

Many unplanned features have been added to the original project.

C.

The product does not satisfy all the requirements of the plan.

D.

An extension to the deadline of the project is requested.

Buy Now
Questions 48

A security team has been informed that user data on the network has been compromised.

What is the first step the organization should take to respond to this data breach?

Options:

A.

Notify affected users of the incident

B.

Implement an access control policy

C.

Increase encryption levels

D.

Publicly announce the breach

Buy Now
Questions 49

What is a function of a compiler?

Options:

A.

It translates a source code and creates an executable program that may be run at a later time.

B.

It takes the most recent instruction and translates it as machine language.

C.

It takes a program written in a high-level language and converts it to a different high-level language program.

D.

It gathers together multiple executable programs and translates them into a readable format.

Buy Now
Questions 50

How does application software differ from operating systems?

Choose 2 answers

Options:

A.

Application software includes system utilities that run on demand of the user.

B.

Application software consists of programs that end users run to accomplish business or personal tasks, such as e-mail.

C.

Application software includes word processors and spreadsheet software that are useful to end users.

D.

Application software supports the computer hardware system directly.

Buy Now
Questions 51

A government agency needs to deploy a secure network connection between its offices in Chicago and New York.

What should be used to facilitate this connection?

Options:

A.

Virtual private network (VPN)

B.

Security information and event management (SIEM)

C.

Point-to-Point Tunneling Protocol (PPTP)

D.

Network access control (NAC)

Buy Now
Questions 52

What is one purpose of an End User License Agreement?

Options:

A.

Allow customers to legally create and sell a new version of the software

B.

Allow customers to legally use the software

C.

Allow customers to legally modify and compile the source code

D.

Allow customers to legally distribute the application to other users

Buy Now
Questions 53

What is a common characteristic of a proprietary software license?

Options:

A.

A business gains the right to modify the software's source code.

B.

A business gains the right to use the software.

C.

A business gains the right to own the software.

D.

A business gains the right to distribute the software freely.

Buy Now
Questions 54

A professional services organization deployed security edge devices in key locations on its corporate network.

How will these devices improve the organization's security posture?

Options:

A.

They act as an initial defense layer for potential threats

B.

They protect from severe distributed denial-of-service (DDoS) attacks

C.

They act as a security information and event management (SIEM) module for a security operations center (SOC) analyst

D.

They are a set of trusted platform module (TPM) devices

Buy Now
Questions 55

A medium-sized grocery chain with locations all across the United States has a new business requirement that all devices must authenticate to access its resources.

What should the grocery chain use for the devices to authenticate?

Options:

A.

Virtual private network (VPN)

B.

Public key infrastructure (PKI)

C.

Certificate signing

D.

Endpoint passwords

Buy Now
Questions 56

Why should an information technology (IT) professional be aware of professional associations?

Options:

A.

Professional associations provide up-to-date training.

B.

Professional associations will ensure higher quality work.

C.

Professional associations upgrade the company's network.

D.

Professional associations give feedback to management.

Buy Now
Exam Name: WGU Cybersecurity Architecture and Engineering (KFO1/D488)
Last Update: Oct 16, 2025
Questions: 232

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99