Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: wrap60

WGU Cybersecurity-Architecture-and-Engineering Dumps

WGU Cybersecurity Architecture and Engineering (KFO1/D488) Questions and Answers

Question 1

A government agency is evaluating its business continuity plan to ensure that its operations can continue during a crisis.

What is the term used to describe the critical services that must be maintained during a disruption?

Options:

A.

Business continuity planning (BCP)

B.

Disaster recovery (DR)

C.

Recovery point objective (RPO)

D.

Mission essential functions (MEFs)

Question 2

Management has asked its networking team to recommend a solution for direct communication between multiple virtual networks in the cloud. The solution must utilize the least amount of administrative effort.

Which solution meets the requirements?

Options:

A.

Virtual network peering

B.

Virtual local area network

C.

Remote Desktop Protocol

D.

Domain name system

Question 3

Which peripheral replaces the mouse on a mobile device?

Options:

A.

Stylus

B.

Jack

C.

Camera

D.

USB

Question 4

An organization wants to implement a new encryption solution for a real-time video conferencing application. The organization wants to ensure that the encryption solution provides protection for the video stream without causing significant delays or latency in the conference.

Which type of encryption will meet the needs of the organization?

Options:

A.

Block ciphers

B.

Asymmetric encryption

C.

Stream ciphers

D.

Hash functions

Question 5

Which part of the Uniform Resource Locator (URL) identifies the server on which the web page can be found?

Options:

A.

Resource path ID

B.

Domain name

C.

Protocol

D.

IP address

Question 6

A cybersecurity analyst at a manufacturing company is tasked with analyzing the indicators of compromise (IOCs) to identify potential threats and vulnerabilities within the organization. While viewing the security information and event management (SIEM), the analyst notices an unknown IP address logging on to the company's Secure Shell (SSH) server.

Which potential vulnerability is the manufacturing company facing?

Options:

A.

Exfiltration

B.

Unpatched software

C.

Enumeration

D.

Weak passwords

Question 7

A retail company has recently implemented a new point of sale (POS) system that is critical to its business.

Which security control is essential for protecting the availability of the POS system?

Options:

A.

Backing up the data stored in the POS system and having a disaster recovery plan

B.

Regularly updating the POS system with the latest security patches

C.

Implementing intrusion detection and prevention systems

D.

Enforcing strict access controls on the POS system

Question 8

The security team has been tasked with selecting a password complexity policy for the organization.

Which password complexity policy option should be recommended?

Options:

A.

Twelve characters with no symbols or numbers

B.

Sixteen characters with at least one letter, one number, and one symbol

C.

Four characters with at least one letter or one number

D.

Eight characters with no symbols or numbers

Question 9

What is the typical organizing principle of a database?

Options:

A.

Selective

B.

Projection

C.

Relational

D.

Modular

Question 10

Which is true about access rights?

Options:

A.

They limit users to permitted items.

B.

They are part of the System Development Life Cycle.

C.

They require the use of a compiler.

D.

They are defined by the machine language.

Question 11

What is a common characteristic of a proprietary software license?

Options:

A.

A business gains the right to modify the software's source code.

B.

A business gains the right to use the software.

C.

A business gains the right to own the software.

D.

A business gains the right to distribute the software freely.

Question 12

A software company is reviewing its disaster recovery plan and wants to identify the criticality of its business processes to prioritize its recovery efforts.

Which will determine the criticality of its business processes?

Options:

A.

Business continuity planning (BCP)

B.

Business impact analysis (BIA)

C.

Disaster recovery (DR)

D.

Incident response (IR)

Question 13

How can the organizational culture support ethical guidelines?

Options:

A.

By outlining the roles of IT specialists in the organization

B.

By outlining the protocols to support security and privacy of data

C.

By creating the system requirements for computers in the organization

D.

By creating the government regulations that apply to the organization

Question 14

How are IT and globalization related?

Options:

A.

IT allows businesses to have a global reach.

B.

IT allows businesses to reach global HIPAA compliance.

C.

IT allows businesses to create tax havens for global companies.

D.

IT allows businesses to create a global common gateway interface (CGI).

Question 15

Why are businesses beginning to use big data?

Options:

A.

To store enormous amounts of paper documents and electronic data in databases and data warehouses for future analysis

B.

To collect large amounts of data from various sources, both external and internal, both paper and electronic

C.

To integrate vast amounts of electronic data into analysis in order to gain insight for better decision making

D.

To connect a myriad of devices to the Internet and allow these devices to logically interact with one another

Question 16

An organization wants to secure remote access to its servers and is looking for a secure protocol that can provide encryption and strong authentication. The organization wants to ensure that its servers can only be accessed by authorized users and that the data exchanged during the session is encrypted.

Which protocol meets the needs of the organization?

Options:

A.

Hypertext Transfer Protocol (HTTP)

B.

File Transfer Protocol (FTP)

C.

Telnet

D.

Secure Shell (SSH)

Question 17

A large healthcare provider is acquiring a small clinic and has identified a full understanding of the clinic's organizational risks. The large provider has several tools it can implement to reduce the clinic's identified risks.

Which type of risk response should the healthcare provider use?

Options:

A.

Risk acceptance

B.

Risk mitigation

C.

Risk transference

D.

Risk avoidance

Question 18

Which technique allows someone to obtain a password while it is in transit?

Options:

A.

Packet sniffing

B.

Buffer overflow

C.

Phishing

D.

Black hat

Question 19

The cybersecurity analyst at a hardware company conducted a vulnerability assessment to identify potential security risks to the organization and discovered multiple vulnerabilities on the company’s webpage. The analyst then provided the results to the Chief Information Security Officer (CISO), who then decided to decommission the website and create a new page with increased security controls.

Options:

A.

Transfer

B.

Accept

C.

Avoid

D.

Mitigate

Question 20

Which two benefits do computer networks provide for businesses?

Choose 2 answers

Options:

A.

Lower IT operations costs

B.

Improved information security

C.

Increased Internet communications speed

D.

Organization cost savings

E.

Increased business efficiency

Question 21

Which risk management strategy will secure an application from potential malware and advanced persistent threats?

Options:

A.

Encryption of all sensitive data stored within the application

B.

Configuration of the application to require strong, unique passwords for all user accounts

C.

Installation of the latest antivirus software on all computers that will access the application

D.

Implementation of a strict firewall policy to restrict access to the application's server

Question 22

What is the correct order of project phases?

Options:

A.

1)Initiation2)Executing3)Planning4)Monitoring and Controllings) Closing

B.

1) Planning2) InitiationAMonitoring and Controlling4) Executings) Closing

C.

1) Executing2) Monitoring and Controlling3) Initiation4) Planning5) Closing

D.

1) Initiation2) Planning° 3) Executing4) Monitoring and Controllings) Closing

Question 23

A company is concerned about the security of its users’ passwords and is looking for a solution to ensure that user credentials are kept safe.

What is the best solution?

Options:

A.

Object storage

B.

Password policies

C.

Removable storage

D.

Hardware key manager

Question 24

An engineer has noticed increased network traffic originating from an unknown internet protocol (IP) address.

Which action should be taken to analyze the unusual network traffic patterns?

Options:

A.

Permanently block all incoming traffic from the unknown IP address

B.

Compare the unknown address to known IP addresses to determine if it is a threat

C.

Temporarily block all incoming traffic from the unknown IP address

D.

Rate limit incoming traffic from the unknown IP address

Question 25

A professional services organization deployed security edge devices in key locations on its corporate network.

How will these devices improve the organization’s security posture?

Options:

A.

They act as an initial defense layer for potential threats

B.

They are a set of Trusted Platform Module (TPM) devices

C.

They protect from severe Distributed Denial-of-Service (DDoS) attacks

D.

They act as a Security Information and Event Management (SIEM) module for a SOC analyst

Question 26

A software development company is concerned about the potential risks associated with exploits that target vulnerabilities in the Linux operating system used by the company's servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

Options:

A.

Implementing a host-based intrusion detection and prevention system

B.

Enforcing strict access control policies for all users

C.

Implementing shell restrictions

D.

Conducting regular security assessments and penetration testing

Question 27

The DevSecOps team for an organization manages a continuous integration and continuous deployment (CI/CD) pipeline for a three-tier web application. Management has asked the team to perform a series of comprehensive post-deployment tests to make sure that all of the components of the application can interact and function properly.

Options:

A.

Dynamic code analysis

B.

Integration testing

C.

Static code analysis

D.

Package scanning

Question 28

An IT organization has seen a surge of ransomware and Trojan horse attacks recently.

Which action should the security team recommend to protect the IT infrastructure from commodity malware threats?

Options:

A.

Installing a firewall to identify malicious traffic

B.

Rerouting suspicious communications to a remote machine

C.

Implementing a two-factor authentication system

D.

Installing endpoint protection software

Question 29

A company wants to improve the security of its software development process and reduce the risk of vulnerabilities in its applications. The company is looking for a solution that can isolate its applications and provide a secure environment for development and testing.

Which security technology meets the needs of this company?

Options:

A.

Data loss prevention (DLP)

B.

Virtual private network (VPN)

C.

Firewall

D.

Containerization

Question 30

An organization wants to ensure that its website is free of certain vulnerabilities before the final hand-off to the client.

What testing method should the organization use to inspect traffic to detect potential issues?

Options:

A.

Bastion scanner

B.

Port scanner

C.

HTTP interceptor

D.

Domain interceptor

Question 31

When is it better to purchase software rather than build a software solution in-house?

Options:

A.

When the company has very specific needs

B.

When the company wants internal growth

C.

When there is a short timeline

D.

When the company wants to develop the skill sets of its internal IT staff

Question 32

An organization's engineering team is developing a mobile application that uses near-field communication (NFC) capabilities but wants to ensure that information communicated using this protocol remains confidential.

Options:

A.

Kerberos centralized server for token and certificate management

B.

Bluetooth device honing restrictions for increased-risk transactions

C.

Portable device management (PDM) to allow only authorized protocols

D.

Encryption to prevent man-in-the-middle and eavesdropping attacks

Question 33

A security team is investigating multiple man-in-the-middle attacks that have taken place on the corporate network over the past few months. The team needs a solution that will ensure that data is not exposed if a man-in-the-middle attack occurs in the future.

What is the best solution?

Options:

A.

Disabling Wi-Fi connections

B.

Enforcing password history

C.

Encrypting data

D.

Ensuring all users have complex passwords

Question 34

A cybersecurity analyst at a healthcare organization was tasked with analyzing the indicators of compromise (IOCs) to identify potential threats and vulnerabilities within the enterprise. Theanalyst notices unknown users logging on to the company's wireless local-area network (WLAN).

What is a potential vulnerability the healthcare organization is facing based on the IOCs identified?

Options:

A.

Unsecured wireless access points

B.

Up-to-date anti-malware software

C.

A strong password policy

D.

Regular security awareness training for employees

Question 35

In which type of network topology are the networked devices connected to a central device like a hub or switch?

Options:

A.

Star

B.

Bus

C.

Mesh

D.

Ring

Question 36

A company has recently implemented a hybrid cloud deployment. The security team has been notified about thousands of failed attempts to connect to routers and switches in the on-premises network. A solution must be implemented to block connections after three unsuccessful SSH attempts on any network device.

Which solution meets the requirements in this scenario?

Options:

A.

Data loss prevention

B.

Firewall

C.

Intrusion prevention system

D.

File integrity monitoring

Question 37

An organization wants to securely transmit sensitive information between two parties. The organization wants to use a cryptographic technique that allows both parties to encrypt anddecrypt messages using the same key. The organization is also concerned about the performance impact of the encryption technique.

Which type of cryptographic algorithm meets the needs of the organization?

Options:

A.

Block cipher

B.

Hash function

C.

Symmetric algorithm

D.

Asymmetric algorithm

Question 38

A company has recently failed a security audit. Many of the end users have passwords older than 365 days.

Which password policy type will prevent this issue?

Options:

A.

Expiration

B.

Length

C.

Recovery

D.

Complexity

Question 39

Which key exchange algorithm is based on advanced cryptography algorithms and is a more efficient alternative to traditional key exchange algorithms?

Options:

A.

Diffie-Hellman (DH)

B.

Elliptic Curve Diffie-Hellman (ECDH)

C.

Rivest-Shamir-Adleman (RSA)

D.

Digital Signature Algorithm (DSA)

Question 40

A small start-up is setting up its first network, and it needs to ensure that its network security is adequate. The start-up is aware of the latest cybersecurity threats and the need for strong security measures. In addition to network security, the start-up wants to ensure that it has a disaster recovery plan in place in case of any unexpected events.

Which approach will meet the needs of the start-up?

Options:

A.

Intrusion detection system (IDS)

B.

Packet filtering

C.

Bootstrapping

D.

Virtual private network (VPN)

Question 41

A company has discovered a vulnerability in its Domain Name System (DNS) that could allow attackers to redirect users to malicious websites. The company has decided to implement a risk management strategy to mitigate this vulnerability.

What is the most effective risk management strategy for this vulnerability?

Options:

A.

Increasing the frequency of DNS server patching

B.

Conducting regular security awareness training for employees on the risks of phishing attacks

C.

Implementing Domain Name System Security Extensions (DNSSEC) to digitally sign DNS responses and prevent DNS spoofing attacks

D.

Restricting DNS access to trusted Internet Protocol (IP) addresses only

Question 42

A corporate website is currently being redesigned, which leaves it vulnerable to security threats. Management does not want to provide an attacker with any information about the web server.

Which strategy should be used to prevent an attacker from gaining unauthorized information?

Options:

A.

Enabling Hypertext Transfer Protocol Secure (HTTPS) over Domain Name Service (DNS)

B.

Using Hypertext Transfer Protocol Secure (HTTPS) for all page and content requests

C.

Obfuscating error messages on the site or within the uniform resource locator (URL)

D.

Becoming Payment Card Industry Data Security Standard (PCI-DSS) compliant and certified

Question 43

What does the following SQL statement produce when executed?

SELECT ‘ FROM Customers

WHERE State = 'Arizona';

Options:

A.

All of the records from the Customers table

B.

All of the records from the Customers database

C.

All of the records from the Customers database that are located in Arizona

D.

All of the records from the Customers table that are located in Arizona

Question 44

A security team is investigating multiple man-in-the-middle (MITM) attacks that have taken place on the corporate network over the past few months. The team needs a solution that will ensure that data is not exposed if a man-in-the-middle attack occurs in the future.

Options:

A.

Enforcing password history

B.

Encrypting data

C.

Ensuring all users have complex passwords

D.

Disabling Wi-Fi connections

Question 45

A company may choose to use CDs, DVDs, hard drives, or even cloud storage for data backup.

Which aspect of data backup does this statement describe?

Options:

A.

Data mirroring

B.

Incremental backups

C.

Image backups

D.

Backup media

Question 46

What is true about an operating system?

Options:

A.

It is a firmware burned onto the computer mother board.

B.

It is a software program that directly supports the computer itself.

C.

It is a hardware component of the computer system.

D.

It is an application program similar to word processors.

Question 47

The security team manages a set of legacy firewalls that have been in production for nearly tenyears. The organization recently issued a mandate requiring that all firewalls be configured with intrusion detection controls that alert the team in real time based on known threats.

Options:

A.

Replacing the legacy firewalls with a security information and event management (SIEM) appliance

B.

Replacing the legacy firewalls with a reverse proxy

C.

Replacing the legacy firewalls with a load balancer

D.

Replacing the legacy firewalls with next-generation firewalls (NGFWs)

Question 48

A software development company has experienced a noticeable slowdown in its network performance, which suggests that some machines on the network may have been infected by a botnet. The company has decided to analyze the threats and vulnerabilities within the enterprise based on the indicators of compromise to mitigate the risk.

What should the company do to detect a botnet and other malware-based threats within the enterprise based on the indicators of compromise?

Options:

A.

Use two-factor authentication for external users

B.

Define strict firewall rules

C.

Constantly scan for known signatures on every machine

D.

Implement a configuration management solution

Question 49

Which type of systems testing includes having end users test the system with simulated data and the help of the developer?

Options:

A.

User Acceptance

B.

Beta

C.

Alpha

D.

Analysis

Question 50

Which security technique should be used to prevent data exfiltration?

Options:

A.

Intrusion Detection Software (IDS)

B.

Data Loss Prevention (DLP)

C.

Multi-Factor Authentication (MFA)

D.

Intrusion Prevention Software (IPS)

Question 51

What is a function of a proxy server?

Options:

A.

It stores files that any user of the network may wish to access.

B.

It acts as a giant cache of web pages that anyone in the organization has recently retrieved.

C.

It responds to user queries to create, manipulate, and retrieve records from a database.

D.

It responds to HTTP requests and can execute scripts to generate dynamic pages.

Question 52

A company wants to ensure that the integrity of its systems is maintained during the startup process.

Which security technology can ensure the integrity of the system during startup by verifying that the system has not been compromised?

Options:

A.

Two-factor authentication

B.

Intrusion detection system (IDS)

C.

Hardware security module (HSM)

D.

Measured boot

Question 53

The DevSecOps team for an organization manages a continuous integration and continuous deployment (CI/CD) pipeline for a three-tier web application. Management has asked the team toperform a series of comprehensive post-deployment tests to make sure that all of the components of the application can interact and function properly.

What should the team recommend?

Options:

A.

Static code analysis

B.

Dynamic code analysis

C.

Integration testing

D.

Package scanning

Question 54

The security team has been notified about multiple man-in-the-middle (MITM) attacks happening on the wireless network over the past thirty days. Management has agreed to upgrade the network infrastructure to help eliminate these attacks.

Which solution fulfills these requirements?

Options:

A.

Security information and event management (SIEM)

B.

Wireless intrusion prevention system (WIPS)

C.

Inline network encryptor

D.

Layer 3 switch

Question 55

An engineer has noticed increased network traffic originating from an unknown IP address. Which action should be taken to analyze the unusual network traffic patterns?

Options:

A.

Compare the unknown address to known IP addresses to determine if it is a threat

B.

Temporarily block all incoming traffic from the unknown IP address

C.

Permanently block all incoming traffic from the unknown IP address

D.

Rate limit incoming traffic from the unknown IP address

Question 56

A project manager is working on a project that involves securing the network of a tall building. The manager is tasked with managing these risks effectively to ensure the successful completion of the project within a given time frame and budget. The manager identified multiple potential risks associated with the project.

What is the next step in the risk management life cycle?

Options:

A.

Identify

B.

Review

C.

Assess

D.

Control

Question 57

A company has recently experienced a data breach in which customer information was stolen. The company is concerned about the potential for future data breaches. A review of the incident revealed that the breach originated from stolen credentials.

Which security measure will meet the needs of this company?

Options:

A.

Implementing two-factor authentication

B.

Conducting background checks on employees

C.

Providing regular security awareness training to employees

D.

Installing a security information and event management (SIEM) system

Question 58

An e-commerce company has recently experienced a data breach in which the personal and financial information of its customers was stolen. The company is concerned about the potential for future data breaches.

What is the most important factor to consider when evaluating the potential for future data breaches in this scenario?

Options:

A.

Impact

B.

Risk

C.

Threat actors

D.

Likelihood

Question 59

A company has identified a potential risk associated with a new software implementation, which could result in a significant data breach.

Which step of the risk management life cycle involves implementing security controls to prevent the risk?

Options:

A.

Assess

B.

Identify

C.

Control

D.

Review

Question 60

A healthcare organization would like to interoperate with another healthcare organization without needing to maintain individual accounts for members of the other organization.

Which technology concept should the company use?

Options:

A.

Single Sign-On (SSO)

B.

Federated Authentication

C.

Multi-Factor Authentication (MFA)

D.

Cloud Identity Provider

Question 61

Which two languages are scripted?

Choose 2 answers

Options:

A.

Python

B.

Ada

C.

PHP

D.

C

Question 62

What are two roles of a DNS?

Choose 2 answers

Options:

A.

Creating IP addresses if it cannot find an alias

B.

Storing the IP address

C.

Translating an IP alias to an actual IP address

D.

Sending packets along a pathway that connects it to the Internet

Question 63

A consultancy organization has many employees who travel with different mobile devices. Having the employees visit an office to update their devices is not feasible due to their travel schedule.

How should the organization ensure that its employees receive the latest security updates?

Options:

A.

By providing remote module updates

B.

By providing tokenized container updates

C.

By providing mobile station updates

D.

By providing over-the-air updates

Question 64

A financial institution is planning to conduct a business impact analysis (BIA) to evaluate the criticality of its business processes and functions.

Which steps will allow the company to perform a BIA?

Options:

A.

Monitor network and system activity, detect security incidents, and respond quickly to minimize the impact on critical business processes

B.

Develop business continuity plans and procedures, establish a crisis management team, and test the plan regularly

C.

Determine business processes and recovery criticality, identify resource requirements, and identify recovery priorities for system resources

D.

Determine recovery time objectives and recovery point objectives, develop recovery strategies, and document the recovery plan

Question 65

Which block cipher mode of operation for encrypting data is simple and efficient but provides no confidentiality beyond that of the underlying block cipher?

Options:

A.

Counter (CTR)

B.

Electronic Codebook (ECB)

C.

Output Feedback (OFB)

D.

Cipher Block Chaining (CBC)

Question 66

A company is developing a new system to process personal information about its customers, including their names, addresses, and purchase histories.

Which term describes the process of identifying and evaluating the potential effects that the new system may have on the privacy of personal information and developing strategies to mitigate those risks?

Options:

A.

Data Protection Impact Assessment (DPIA)

B.

Business Continuity Planning (BCP)

C.

Risk Management

D.

Disaster Recovery (DR)

Question 67

Which risk management strategy will help defeat piracy efforts on a new patient management system?

Options:

A.

Configuration of the patient management system to disable all external device connections on all workstations

B.

Incorporation of end-to-end encryption for all patient data

C.

Implementation of regular virus scanning for all workstations

D.

Implementation of licensing technologies in order to restrict unauthorized access to the system

Question 68

What is the vocabulary and set of rules for instructing a computer to perform certain tasks?

Options:

A.

Low-level language

B.

Translator language

C.

Machine language

D.

Programming language

Question 69

A healthcare provider is required to comply with the Health Insurance Portability and Accountability Act (HIPAA), which sets requirements for the protection of patient health information. The provider uses various software applications to manage and store patient health information, which must be coded to protect its confidentiality and integrity.

Which protocol will meet the needs of this provider?

Options:

A.

Wired Equivalent Privacy (WEP)

B.

Simple Mail Transfer Protocol (SMTP)

C.

Rivest–Shamir–Adleman (RSA)

D.

Advanced Encryption Standard (AES)

Page: 1 / 23
Total 232 questions