Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

WGU Cybersecurity-Architecture-and-Engineering WGU Cybersecurity Architecture and Engineering (KFO1/D488) Exam Practice Test

WGU Cybersecurity Architecture and Engineering (KFO1/D488) Questions and Answers

Question 1

A company is looking to monitor and detect any suspicious activity on its servers. The company wants to implement a security solution that can detect any unauthorized access or unusual activity on the servers.

Which security technology will meet the needs of this company?

Options:

A.

Hardware security module (HSM)

B.

Two-factor authentication

C.

Antivirus tools

D.

Host-based intrusion detection system (HIDS)

Question 2

An organization wants to ensure that its website is free of certain vulnerabilities before the final hand-off to the client.

What testing method should the organization use to inspect traffic to detect potential issues?

Options:

A.

Bastion scanner

B.

Port scanner

C.

HTTP interceptor

D.

Domain interceptor

Question 3

The development team has requested permission to use several open-source libraries to build a corporate web application.

Which resource can the security team recommend to ensure these libraries can be trusted?

Options:

A.

Agile software development

B.

Waterfall software development

C.

Common Vulnerabilities and Exposures (CVE)

D.

Continuous delivery

Question 4

A small online retailer stores customer information, product inventory, and financial data on its local servers.

What are the necessary components of a business continuity and disaster recovery plan for this company?

Options:

A.

A detailed evacuation plan, frequent data backups, and regular cybersecurity training for employees

B.

Redundant backups, a communication plan, and a designated off-site location for data storage and recovery

C.

A comprehensive insurance policy, a list of emergency contacts, and a system for continuous monitoring of network activity

D.

Routine maintenance of servers, an emergency generator, and a policy for employees to work remotely in case of a disaster

Question 5

A government agency is planning a hybrid cloud deployment. Strict controls must be in place that can label classified data. The solution must ensure that access rights will be granted based on the user's government security classification.

Which type of access control should be used?

Options:

A.

Mandatory access control (MAC)

B.

Attribute-based access control (ABAC)

C.

Discretionary access control (DAC)

D.

Role-based access control (RBAC)

Question 6

What are three operating systems that are commonly used today?

Choose 3 answers

Options:

A.

Microsoft Outlook

B.

Mac OS

C.

Linux

D.

MySQL

E.

Microsoft Windows

F.

Mozilla Firefox

Question 7

An IT organization has recently migrated its servers to the cloud. The security team needs to delegate administrative control of multiple cloud services to various administrators inside the company. This team needs a granular solution that will offer the most flexibility while maintaining a secure posture.

What is the best solution?

Options:

A.

Open Authorization (OAuth)

B.

Security Assertion Markup Language (SAML)

C.

Role-based access control (RBAC)

D.

Kerberos

Question 8

A consultancy organization has many employees who travel with different mobile devices. Having the employees visit an office to update their devices is not feasible due to their travel schedule.

How should the organization ensure that its employees receive the latest security updates?

Options:

A.

By providing remote module updates

B.

By providing tokenized container updates

C.

By providing mobile station updates

D.

By providing over-the-air updates

Question 9

A retail company wants to establish the frequency at which it needs to backup its critical data to ensure it can be restored in case of a disruption with the least amount of acceptable loss in recovery.

What is the term used to describe this metric?

Options:

A.

Continuous data protection (CDP)

B.

Business impact analysis (BIA)

C.

Disaster recovery (DR)

D.

Recovery point objective (RPO)

Question 10

A government agency needs to deploy a secure network connection between its offices in Chicago and New York.

What should be used to facilitate this connection?

Options:

A.

Virtual private network (VPN)

B.

Security information and event management (SIEM)

C.

Point-to-Point Tunneling Protocol (PPTP)

D.

Network access control (NAC)

Question 11

How can the organizational culture support ethical guidelines?

Options:

A.

By outlining the roles of IT specialists in the organization

B.

By outlining the protocols to support security and privacy of data

C.

By creating the system requirements for computers in the organization

D.

By creating the government regulations that apply to the organization

Question 12

Which technique allows someone to obtain a password while it is in transit?

Options:

A.

Packet sniffing

B.

Buffer overflow

C.

Phishing

D.

Black hat

Question 13

A software development company is concerned about the potential risks associated with exploits that target vulnerabilities in the Linux operating system used by the company's servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

Options:

A.

Implementing a host-based intrusion detection and prevention system

B.

Enforcing strict access control policies for all users

C.

Implementing shell restrictions

D.

Conducting regular security assessments and penetration testing

Question 14

Which IT department goal would support business goals?

Options:

A.

Overseeing funds flowing through the organization

B.

Developing an online shopping cart for company products

C.

Promoting the company's products and services

D.

Interviewing applicants for marketing positions

Question 15

A government agency is required to comply with the Federal Information Security Modernization Act (FISMA), which establishes security requirements for federal information systems. The agency needs to secure its external network, which connects to the internet and is used by employees, contractors, and other authorized personnel.

Which security control will secure the external network and protect against unauthorized access?

Options:

A.

Intrusion detection and prevention

B.

Firewall

C.

Access controls

D.

Network segmentation

Question 16

Which operation converts raw data into information?

Options:

A.

Input

B.

Output

C.

Storage

D.

Processing

Question 17

A company has recently experienced a data breach in which customer information was stolen. The company is concerned about the potential for future data breaches. A review of the incident revealed that the breach originated from stolen credentials.

Which security measure will meet the needs of this company?

Options:

A.

Implementing two-factor authentication

B.

Conducting background checks on employees

C.

Providing regular security awareness training to employees

D.

Installing a security information and event management (SIEM) system

Question 18

A project manager is working on a project that involves securing the network of a tall building. The manager is tasked with managing these risks effectively to ensure the successful completion of the project within a given time frame and budget. The manager identified multiple potential risks associated with the project.

What is the next step in the risk management life cycle?

Options:

A.

Identify

B.

Review

C.

Assess

D.

Control

Question 19

A company is planning to implement a new cloud-based system to store sensitive customer information.

What should be identified in the first step of the risk management process for this project?

Options:

A.

Possible threats to the new system

B.

Potential business impacts of a security breach

C.

Potential vulnerabilities of the new system

D.

Business assets that will be stored in the new system

Question 20

How are IT and globalization related?

Options:

A.

IT allows businesses to have a global reach.

B.

IT allows businesses to reach global HIPAA compliance.

C.

IT allows businesses to create tax havens for global companies.

D.

IT allows businesses to create a global common gateway interface (CGI).

Question 21

A security engineer has been asked to audit unapproved changes that have recently taken place in a corporate application.

Which logging mechanism will create an audit trail?

Options:

A.

NetFlow logs

B.

Access logs

C.

Packet capture logs

D.

Router logs

Question 22

An organization is experiencing multiple instances of attempted access from geographical locations where there are no corporate offices or staff.

What should a network administrator do to prevent further access attempts?

Options:

A.

Adjust the rule sets within the security information and event manager (SIEM) tool

B.

Adjust the Domain Name Service (DNS) server A Records

C.

Adjust the firewall configuration to drop traffic from these addresses

D.

Adjust the main proxy server to only allow specific addresses

Question 23

A government agency is evaluating its business continuity plan to ensure that its operations can continue during a crisis.

What is the term used to describe the critical services that must be maintained during a disruption?

Options:

A.

Business continuity planning (BCP)

B.

Disaster recovery (DR)

C.

Recovery point objective (RPO)

D.

Mission essential functions (MEFs)

Question 24

What is a component of IT infrastructure?

Options:

A.

Data

B.

People

C.

Networks

D.

Printer

Question 25

What is one purpose of an End User License Agreement?

Options:

A.

Allow customers to legally create and sell a new version of the software

B.

Allow customers to legally use the software

C.

Allow customers to legally modify and compile the source code

D.

Allow customers to legally distribute the application to other users

Question 26

An organization wants to implement a new encryption solution for a real-time video conferencing application. The organization wants to ensure that the encryption solution provides protection for the video stream without causing significant delays or latency in the conference.

Which type of encryption will meet the needs of the organization?

Options:

A.

Block ciphers

B.

Asymmetric encryption

C.

Stream ciphers

D.

Hash functions

Question 27

Which type of systems testing includes having end users test the system with simulated data and the help of the developer?

Options:

A.

User Acceptance

B.

Beta

C.

Alpha

D.

Analysis

Question 28

An engineer has noticed increased network traffic originating from an unknown internet protocol (IP) address.

Which action should be taken to analyze the unusual network traffic patterns?

Options:

A.

Permanently block all incoming traffic from the unknown IP address

B.

Compare the unknown address to known IP addresses to determine if it is a threat

C.

Temporarily block all incoming traffic from the unknown IP address

D.

Rate limit incoming traffic from the unknown IP address

Question 29

A cloud service provider is concerned about the potential risks associated with hardware-based attacks on its virtual machines. The provider has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this provider?

Options:

A.

Conducting regular vulnerability assessments and penetration testing

B.

Disabling central processing unit (CPU) virtualization support

C.

Implementing a web application firewall to monitor incoming traffic

D.

Enforcing strict access control policies for all users

Question 30

Why should an information technology (IT) professional be aware of professional associations?

Options:

A.

Professional associations provide up-to-date training.

B.

Professional associations will ensure higher quality work.

C.

Professional associations upgrade the company's network.

D.

Professional associations give feedback to management.

Question 31

A company wants to improve the security of its software development process and reduce the risk of vulnerabilities in its applications. The company is looking for a solution that can isolate its applications and provide a secure environment for development and testing.

Which security technology meets the needs of this company?

Options:

A.

Data loss prevention (DLP)

B.

Virtual private network (VPN)

C.

Firewall

D.

Containerization

Question 32

Which type of communications media uses light waves to transmit data?

Options:

A.

Fiber optic

B.

Radio towers

C.

Twisted pair

D.

Coaxial

Question 33

An insurance agency is concerned that some employees could be mishandling funds and covering it up. The agency wants to temporarily block these employees from working and ensure that operations continue.

Which strategy should the agency implement?

Options:

A.

Separation of duties

B.

Mandatory vacation

C.

Job rotation

D.

Least privilege

Question 34

What type of software utilizes a commercial software license?

Options:

A.

Public Domain

B.

Proprietary

C.

Open Source

D.

Shareware

Question 35

A software development company has experienced a noticeable slowdown in its network performance, which suggests that some machines on the network may have been infected by a botnet. The company has decided to analyze the threats and vulnerabilities within the enterprise based on the indicators of compromise to mitigate the risk.

What should the company do to detect a botnet and other malware-based threats within the enterprise based on the indicators of compromise?

Options:

A.

Use two-factor authentication for external users

B.

Define strict firewall rules

C.

Constantly scan for known signatures on every machine

D.

Implement a configuration management solution

Question 36

Which action should an IT department take if an organization decides to expand its business by selling products online?

Options:

A.

Make sure the website can handle e-commerce transactions

B.

Ensure that the strategic goals aligned with the organization's mission statement

C.

Market the company’s products or services

D.

Manage capital to ensure a successful website

Question 37

After a recent security assessment, it was discovered that many company devices have unnecessary ports opened to the network.

What should the company configure to fix this?

Options:

A.

Intrusion prevention system

B.

Web application firewall

C.

Device hardening

D.

Intrusion detection system

Question 38

What signals the development of scope creep?

Options:

A.

Programmers are focused on a single feature.

B.

Many unplanned features have been added to the original project.

C.

The product does not satisfy all the requirements of the plan.

D.

An extension to the deadline of the project is requested.

Question 39

A retail company has recently implemented a new point of sale (POS) system that is critical to its business.

Which security control is essential for protecting the availability of the POS system?

Options:

A.

Implementing intrusion detection and prevention systems can help detect and prevent unauthorized access to the POS system.

B.

Regularly backing up the data stored in the POS system and having a disaster recovery plan can help ensure that the system is available in the event of a security incident or system failure.

C.

Enforcing strict access controls can limit the number of users with access to the POS system and prevent unauthorized access.

D.

Regularly updating the POS system with the latest security patches can help prevent exploitation of known vulnerabilities and maintain the system's availability.

Question 40

Which system conversion method deploys the new system while the old system is still operational in order to compare output?

Options:

A.

Phased

B.

Direct

C.

Parallel

D.

Pilot

Question 41

A software development company is required to comply with the Payment Card Industry Data Security Standard (PCI DSS), which sets requirements for the protection of cardholder data. The company uses Secure Shell (SSH) to connect to its cloud-based development environment, which contains cardholder data.

Which security control will meet the needs of the company?

Options:

A.

Patch management

B.

Network segmentation

C.

Strong authentication

D.

Vulnerability analysis

Question 42

During a vulnerability assessment, several end-of-life operating systems were discovered within the environment.

Which action should be taken to resolve the issue?

Options:

A.

Shut down and remove the end-of-life machines

B.

Disconnect the end-of-life machines

C.

Block the end-of-life machines

D.

Upgrade the remaining end-of-life machines

Question 43

Which risk management strategy will help defeat piracy efforts on a new patient management system?

Options:

A.

Configuration of the patient management system to disable all external device connections on all workstations

B.

Incorporation of end-to-end encryption for all patient data

C.

Implementation of regular virus scanning for all workstations

D.

Implementation of licensing technologies in order to restrict unauthorized access to the system

Question 44

Which software allows the user to easily access the hardware of a computer?

Options:

A.

Productivity

B.

FTP client

C.

Application

D.

Operating system

Question 45

What is the role of the CPU in a computing environment?

Choose 2 answers

Options:

A.

Carrying out the instructions of a computer program

B.

Storing data as it is being processed

C.

Directing electrical current over the circuit board

D.

Connecting components to the system unit

E.

Containing an arithmetic logic unit (ALU) that performs arithmetic and logic operations

Question 46

A company is developing a new mobile application to support external customers and contractors. The application needs to allow users to sign in using third-party social identities.

What is the best protocol?

Options:

A.

Security Assertion Markup Language (SAML)

B.

Kerberos

C.

Lightweight Directory Access Protocol (LDAP)

D.

Open Authorization (OAuth)

Question 47

A large healthcare provider is acquiring a small clinic and has identified a full understanding of the clinic's organizational risks. The large provider has several tools it can implement to reduce the clinic's identified risks.

Which type of risk response should the healthcare provider use?

Options:

A.

Risk acceptance

B.

Risk mitigation

C.

Risk transference

D.

Risk avoidance

Question 48

An organization wants to secure remote access to its servers and is looking for a secure protocol that can provide encryption and strong authentication. The organization wants to ensure that its servers can only be accessed by authorized users and that the data exchanged during the session is encrypted.

Which protocol meets the needs of the organization?

Options:

A.

Hypertext Transfer Protocol (HTTP)

B.

File Transfer Protocol (FTP)

C.

Telnet

D.

Secure Shell (SSH)

Question 49

An employee needs to execute a program from the command line.

Which peripheral device should be used?

Options:

A.

Keyboard

B.

Hard drive

C.

Speaker

D.

Printer

Question 50

A company has identified a potential risk associated with a new software implementation, which could result in a significant data breach.

Which step of the risk management life cycle involves implementing security controls to prevent the risk?

Options:

A.

Assess

B.

Identify

C.

Control

D.

Review

Question 51

A small start-up is setting up its first network, and it needs to ensure that its network security is adequate. The start-up is aware of the latest cybersecurity threats and the need for strong security measures. In addition to network security, the start-up wants to ensure that it has a disaster recovery plan in place in case of any unexpected events.

Which approach will meet the needs of the start-up?

Options:

A.

Intrusion detection system (IDS)

B.

Packet filtering

C.

Bootstrapping

D.

Virtual private network (VPN)

Question 52

A professional services organization deployed security edge devices in key locations on its corporate network.

How will these devices improve the organization's security posture?

Options:

A.

They act as an initial defense layer for potential threats

B.

They protect from severe distributed denial-of-service (DDoS) attacks

C.

They act as a security information and event management (SIEM) module for a security operations center (SOC) analyst

D.

They are a set of trusted platform module (TPM) devices

Question 53

What does the following SQL statement produce when executed?

SELECT ‘ FROM Customers

WHERE State = ’Arizona';

Options:

A.

All of the records from the Customers table

B.

All of the records from the Customers database

C.

All of the records from the Customers database that are located in Arizona

D.

All of the records from the Customers table that are located in Arizona