Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium WGU Cybersecurity-Architecture-and-Engineering Dumps Questions Answers

WGU Cybersecurity Architecture and Engineering (KFO1/D488) Questions and Answers

Question 1

An application team manages a large farm of web servers on virtual machines in the cloud. The team wants to reduce the server load by caching static content. Adding a second layer of protection is also a requirement.

What should this team recommend in this scenario?

Options:

A.

Firewall rule changes

B.

Intrusion detection system (IDS)

C.

Reverse proxy

D.

Network address translation (NAT)

Buy Now
Question 2

What is a function of a compiler?

Options:

A.

It translates a source code and creates an executable program that may be run at a later time.

B.

It takes the most recent instruction and translates it as machine language.

C.

It takes a program written in a high-level language and converts it to a different high-level language program.

D.

It gathers together multiple executable programs and translates them into a readable format.

Question 3

A company is concerned about the security of its users’ passwords and is looking for a solution to ensure that user credentials are kept safe.

What is the best solution?

Options:

A.

Object storage

B.

Password policies

C.

Removable storage

D.

Hardware key manager

Question 4

What is a component of IT infrastructure?

Options:

A.

Data

B.

People

C.

Networks

D.

Printer

Question 5

A company is developing a new mobile application to support external customers and contractors. The application needs to allow users to sign in using third-party social identities.

What is the best protocol?

Options:

A.

Security Assertion Markup Language (SAML)

B.

Kerberos

C.

Lightweight Directory Access Protocol (LDAP)

D.

Open Authorization (OAuth)

Question 6

A company's website is suddenly redirecting users to a suspicious landing page asking for personal information.

What is the most likely cause of the issue?

Options:

A.

Exfiltration

B.

Phishing

C.

Tampering

D.

Ransomware

Question 7

What is one purpose of an End User License Agreement?

Options:

A.

Allow customers to legally create and sell a new version of the software

B.

Allow customers to legally use the software

C.

Allow customers to legally modify and compile the source code

D.

Allow customers to legally distribute the application to other users

Question 8

A financial services company is concerned about the potential risks associated with sensitive customer data stored on employee laptops. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

Options:

A.

Restricting user permissions for laptop software installation

B.

Implementing biometric authentication for laptop log-ins

C.

Implementing local drive encryption on employee laptops

D.

Conducting regular security awareness training for employees

Question 9

What is the vocabulary and set of rules for instructing a computer to perform certain tasks?

Options:

A.

Low-level language

B.

Translator language

C.

Machine language

D.

Programming language

Question 10

An IT organization needs to enable secure communication across virtual networks in Microsoft Azure and Amazon Web Services.

Which protocol will offer the most reliable and secure method for data transport?

Options:

A.

Transmission Control Protocol (TCP)

B.

Internet Protocol Security (IPsec)

C.

File Transfer Protocol (FTP)

D.

Secure Shell (SSH)

Question 11

The security team has been tasked with selecting a password complexity policy for the organization.

Which password complexity policy option should be recommended?

Options:

A.

Twelve characters with no symbols or numbers

B.

Sixteen characters with at least one letter, one number, and one symbol

C.

Four characters with at least one letter or one number

D.

Eight characters with no symbols or numbers

Question 12

A retail company has recently implemented a new point of sale (POS) system that is critical to its business.

Which security control is essential for protecting the availability of the POS system?

Options:

A.

Implementing intrusion detection and prevention systems can help detect and prevent unauthorized access to the POS system.

B.

Regularly backing up the data stored in the POS system and having a disaster recovery plan can help ensure that the system is available in the event of a security incident or system failure.

C.

Enforcing strict access controls can limit the number of users with access to the POS system and prevent unauthorized access.

D.

Regularly updating the POS system with the latest security patches can help prevent exploitation of known vulnerabilities and maintain the system's availability.

Question 13

What is a common characteristic of a proprietary software license?

Options:

A.

A business gains the right to modify the software's source code.

B.

A business gains the right to use the software.

C.

A business gains the right to own the software.

D.

A business gains the right to distribute the software freely.

Question 14

An organization wants to ensure that its website is free of certain vulnerabilities before the final hand-off to the client.

What testing method should the organization use to inspect traffic to detect potential issues?

Options:

A.

Bastion scanner

B.

Port scanner

C.

HTTP interceptor

D.

Domain interceptor

Question 15

A cybersecurity analyst at a healthcare organization was tasked with analyzing the indicators of compromise (IOCs) to identify potential threats and vulnerabilities within the enterprise. Theanalyst notices unknown users logging on to the company's wireless local-area network (WLAN).

What is a potential vulnerability the healthcare organization is facing based on the IOCs identified?

Options:

A.

Unsecured wireless access points

B.

Up-to-date anti-malware software

C.

A strong password policy

D.

Regular security awareness training for employees

Question 16

What type of software utilizes a commercial software license?

Options:

A.

Public Domain

B.

Proprietary

C.

Open Source

D.

Shareware

Question 17

A company has recently implemented a hybrid cloud deployment. The security team has been notified about thousands of failed attempts to connect to routers and switches in the on-premises network. A solution must be implemented to block connections after three unsuccessful SSH attempts on any network device.

Which solution meets the requirements in this scenario?

Options:

A.

Data loss prevention

B.

Firewall

C.

Intrusion prevention system

D.

File integrity monitoring

Question 18

Which risk management strategy will secure an application from potential malware and advanced persistent threats?

Options:

A.

Encryption of all sensitive data stored within the application

B.

Configuration of the application to require strong, unique passwords for all user accounts

C.

Installation of the latest antivirus software on all computers that will access the application

D.

Implementation of a strict firewall policy to restrict access to the application's server

Question 19

A security engineer has been asked to audit unapproved changes that have recently taken place in a corporate application.

Which logging mechanism will create an audit trail?

Options:

A.

NetFlow logs

B.

Access logs

C.

Packet capture logs

D.

Router logs

Question 20

A company with a hybrid cloud deployment needs to identify all possible threat types that could impact production systems.

Which threat hunting technique should be used to identify potential attacks that have already occurred?

Options:

A.

Honeypots

B.

Log analysis

C.

Social engineering

D.

Penetration testing

Question 21

A healthcare organization would like to work with another healthcare organization without needing to maintain identified accounts for members of the other organization.

Which technology concept should the company use?

Options:

A.

Cloud identity provider

B.

Single sign-on (SSO)

C.

Multi-factor authentication (MFA)

D.

Federated authentication

Question 22

A company wants to ensure that the integrity of its systems is maintained during the startup process.

Which security technology can ensure the integrity of the system during startup by verifying that the system has not been compromised?

Options:

A.

Two-factor authentication

B.

Intrusion detection system (IDS)

C.

Hardware security module (HSM)

D.

Measured boot

Question 23

An e-learning company uses Amazon Simple Storage Service (Amazon S3) to store e-books and video files that are served to customers through a custom application. The company has realized that someone has been stealing its intellectual property.

Which threat actor is most likely in this scenario?

Options:

A.

Advanced persistent threat

B.

Novice hacker

C.

Competitor

D.

Hacktivist

Question 24

A government agency is planning a hybrid cloud deployment. Strict controls must be in place that can label classified data. The solution must ensure that access rights will be granted based on the user's government security classification.

Which type of access control should be used?

Options:

A.

Mandatory access control (MAC)

B.

Attribute-based access control (ABAC)

C.

Discretionary access control (DAC)

D.

Role-based access control (RBAC)

Question 25

Which risk management strategy will supplement privacy requirements for data on an electronic health record (EHR) system?

Options:

A.

Configuration of the system to disable universal serial bus (USB) ports on all workstations

B.

Encryption of all network traffic between the EHR system and external networks

C.

Implementation of role-based access controls and encryption of all sensitive data

D.

Implementation of a strict firewall policy to restrict access to the system's server

Question 26

In which generation were computers first built with transistors?

Options:

A.

First generation

B.

Second generation

C.

Third generation

D.

Fourth generation

Question 27

How can the organizational culture support ethical guidelines?

Options:

A.

By outlining the roles of IT specialists in the organization

B.

By outlining the protocols to support security and privacy of data

C.

By creating the system requirements for computers in the organization

D.

By creating the government regulations that apply to the organization

Question 28

A company has identified a potential risk associated with a new software implementation, which could result in a significant data breach.

Which step of the risk management life cycle involves implementing security controls to prevent the risk?

Options:

A.

Assess

B.

Identify

C.

Control

D.

Review

Question 29

What is scope creep?

Options:

A.

Realization that the organization staffing is inadequate

B.

The extent of the project that lacks needed requirements

C.

Small changes in a project that lead to bigger changes

D.

When the project is completed in less than the required time

Question 30

Which motherboard component is used for short-term storage of data?

Options:

A.

Hard Drive

B.

BIOS

C.

Read Only Memory

D.

RAM

Question 31

A large technology company has discovered a known vulnerability in its network infrastructure. The infrastructure contains a number of retired assets that are no longer receiving security updates, which can potentially be exploited by attackers to compromise the network. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

Options:

A.

Enforcing strict access control policies for all network devices

B.

Conducting regular vulnerability scans to identify potential weaknesses

C.

Implementing intrusion detection and prevention systems (IDPS)

D.

Removing all end-of-life devices from the network

Question 32

Which life cycle is part of the process for planning, creating, testing, and deploying information systems?

Options:

A.

Network Development Life Cycle (NDLC)

B.

System Development Life Cycle (SDLC)

C.

Database Creation System Life Cycle (DCSLC)

D.

Software Test Life Cycle (STLC)

Question 33

When is it better to purchase software rather than build a software solution in-house?

Options:

A.

When the company has very specific needs

B.

When the company wants internal growth

C.

When there is a short timeline

D.

When the company wants to develop the skill sets of its internal IT staff

Question 34

A company has recently experienced a data breach in which customer information was stolen. The company is concerned about the potential for future data breaches. A review of the incident revealed that the breach originated from stolen credentials.

Which security measure will meet the needs of this company?

Options:

A.

Implementing two-factor authentication

B.

Conducting background checks on employees

C.

Providing regular security awareness training to employees

D.

Installing a security information and event management (SIEM) system

Question 35

An IT team has been tasked with improving an organization's security posture to defend against potential malicious actors.

What is the first step when hunting for potential threats?

Options:

A.

Deploy an anti-malware solution

B.

Implement an intrusion detection system

C.

Form an incident response team

D.

Establish a baseline for normal activity

Question 36

A healthcare organization has experienced a ransomware attack that has resulted in the encryption of all patient medical records. The organization has backups, but restoring the data will take severaldays, and during that time, patient care will be significantly diminished.

What is the most important factor to consider when evaluating the severity of the ransomware attack?

Options:

A.

Threat actors

B.

Risk

C.

Impact

D.

Likelihood

Question 37

What is true about an operating system?

Options:

A.

It is a firmware burned onto the computer mother board.

B.

It is a software program that directly supports the computer itself.

C.

It is a hardware component of the computer system.

D.

It is an application program similar to word processors.

Question 38

Which characteristic applies to machine-level languages?

Options:

A.

They use language translators known as compilers

B.

They use cables to connect circuits

C.

They use collection of short scripts

D.

They use language translators known as assemblers

Question 39

A consultancy organization has many employees who travel with different mobile devices. Having the employees visit an office to update their devices is not feasible due to their travel schedule.

How should the organization ensure that its employees receive the latest security updates?

Options:

A.

By providing remote module updates

B.

By providing tokenized container updates

C.

By providing mobile station updates

D.

By providing over-the-air updates

Question 40

An organization wants to implement a new encryption solution to protect sensitive data stored in a database. The organization wants to ensure that the encryption solution provides strong protection for the data and is willing to sacrifice performance.

Which type of encryption meets the needs of the organization?

Options:

A.

Stream ciphers

B.

Asymmetric encryption

C.

Hash functions

D.

Block ciphers

Question 41

During a vulnerability assessment, several end-of-life operating systems were discovered within the environment.

Which action should be taken to resolve the issue?

Options:

A.

Shut down and remove the end-of-life machines

B.

Disconnect the end-of-life machines

C.

Block the end-of-life machines

D.

Upgrade the remaining end-of-life machines

Question 42

Which system conversion method deploys the new system while the old system is still operational in order to compare output?

Options:

A.

Phased

B.

Direct

C.

Parallel

D.

Pilot

Question 43

Which block cipher mode of operation for encrypting data is simple and efficient and provides no confidentiality beyond that of the underlying block cipher?

Options:

A.

Electronic codebook (ECB)

B.

Cipher block chaining (CBC)

C.

Counter (CTR)

D.

Output feedback (OFB)

Question 44

Which characteristic identifies intranet application software?

Options:

A.

Hosted by an outsourced provider

B.

Hosted in the internal business network

C.

Hosted by a third-party web portal

D.

Hosted on an individual computer

Question 45

Which item information should be stored in a database to determine an order total?

Options:

A.

Item order line

B.

Item unit price

C.

Item description

D.

Item restock levels

Question 46

A security team has been informed that user data on the network has been compromised.

What is the first step the organization should take to respond to this data breach?

Options:

A.

Notify affected users of the incident

B.

Implement an access control policy

C.

Increase encryption levels

D.

Publicly announce the breach

Question 47

In which type of network topology are the networked devices connected to a central device like a hub or switch?

Options:

A.

Star

B.

Bus

C.

Mesh

D.

Ring

Question 48

Which task is the responsibility of a database administrator?

Options:

A.

Installing and configuring databases

B.

Compiling code into an executable file

C.

Deciding on database applications for the company

D.

Troubleshooting network security issues

Question 49

A corporate website is currently being redesigned, which leaves it vulnerable to security threats. Management does not want to provide an attacker with any information about the web server.

Which strategy should be used to prevent an attacker from gaining unauthorized information?

Options:

A.

Enabling Hypertext Transfer Protocol Secure (HTTPS) over Domain Name Service (DNS)

B.

Using Hypertext Transfer Protocol Secure (HTTPS) for all page and content requests

C.

Obfuscating error messages on the site or within the uniform resource locator (URL)

D.

Becoming Payment Card Industry Data Security Standard (PCI-DSS) compliant and certified

Question 50

How are IT and globalization related?

Options:

A.

IT allows businesses to have a global reach.

B.

IT allows businesses to reach global HIPAA compliance.

C.

IT allows businesses to create tax havens for global companies.

D.

IT allows businesses to create a global common gateway interface (CGI).

Question 51

What is the correct order of project phases?

Options:

A.

1)Initiation2)Executing3)Planning4)Monitoring and Controllings) Closing

B.

1) Planning2) InitiationAMonitoring and Controlling4) Executings) Closing

C.

1) Executing2) Monitoring and Controlling3) Initiation4) Planning5) Closing

D.

1) Initiation2) Planning° 3) Executing4) Monitoring and Controllings) Closing

Question 52

The development team has requested permission to use several open-source libraries to build a corporate web application.

Which resource can the security team recommend to ensure these libraries can be trusted?

Options:

A.

Agile software development

B.

Waterfall software development

C.

Common Vulnerabilities and Exposures (CVE)

D.

Continuous delivery

Question 53

In which state is data considered information?

Options:

A.

Raw

B.

Input

C.

Unprocessed

D.

Processed

Question 54

A large corporation is considering expanding its operations into a new geographic region. The corporation is concerned about the potential dangers associated with this expansion.

What is the most important factor to consider when evaluating the potential risks in this scenario?

Options:

A.

Impact of attack

B.

Inherent risk

C.

Threat of attack

D.

Likelihood of attack

Question 55

While undergoing a security audit, it is determined that an organization has several backup repositories hosted in the cloud without any level of protection.

Which action should be taken to protect the backup repositories first?

Options:

A.

Audit access logs

B.

Run a vulnerability scan

C.

Restrict access to the backups

D.

Disable the backup repositories

Question 56

Management has asked its networking team to recommend a solution for direct communication between multiple virtual networks in the cloud. The solution must utilize the least amount of administrative effort.

Which solution meets the requirements?

Options:

A.

Virtual network peering

B.

Virtual local area network

C.

Remote Desktop Protocol

D.

Domain name system

Question 57

An organization's board of directors is reviewing the risk register and attempting to evaluate whether there is too much risk for the organization.

Which metric should the board review?

Options:

A.

Risk appetite

B.

Risk evaluation plan

C.

Risk treatment plan

D.

Risk tolerance

Question 58

Which key exchange algorithm is based on advanced cryptography algorithms and is a more efficient alternative to traditional key exchange algorithms?

Options:

A.

Diffie-Hellman (DH)

B.

Elliptic Curve Diffie-Hellman (ECDH)

C.

Rivest-Shamir-Adleman (RSA)

D.

Digital Signature Algorithm (DSA)