Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > WGU > Courses and Certificates > Cybersecurity-Architecture-and-Engineering

Cybersecurity-Architecture-and-Engineering WGU Cybersecurity Architecture and Engineering (KFO1/D488) Question and Answers

Question # 4

What signals the development of scope creep?

A.

Programmers are focused on a single feature.

B.

Many unplanned features have been added to the original project.

C.

The product does not satisfy all the requirements of the plan.

D.

An extension to the deadline of the project is requested.

Full Access
Question # 5

A government agency needs to deploy a secure network connection between its offices in Chicago and New York.

What should be used to facilitate this connection?

A.

Virtual private network (VPN)

B.

Security information and event management (SIEM)

C.

Point-to-Point Tunneling Protocol (PPTP)

D.

Network access control (NAC)

Full Access
Question # 6

A large technology company has discovered a known vulnerability in its network infrastructure. The infrastructure contains a number of retired assets that are no longer receiving security updates, which can potentially be exploited by attackers to compromise the network. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

A.

Enforcing strict access control policies for all network devices

B.

Conducting regular vulnerability scans to identify potential weaknesses

C.

Implementing intrusion detection and prevention systems (IDPS)

D.

Removing all end-of-life devices from the network

Full Access
Question # 7

Which technique allows someone to obtain a password while it is in transit?

A.

Packet sniffing

B.

Buffer overflow

C.

Phishing

D.

Black hat

Full Access
Question # 8

Which risk management strategy will ensure the secure configuration and deployment of a new supply chain management system and prevent identity theft?

A.

Use of a strict firewall policy to restrict access to the system’s server

B.

Implementation of multifactor authentication for all user accounts

C.

Implementation of regular vulnerability scans and patch management

D.

Configuration of the system to disable all USB ports on all workstations

Full Access
Question # 9

Why should an information technology (IT) professional be aware of professional associations?

A.

Professional associations provide up-to-date training.

B.

Professional associations will ensure higher quality work.

C.

Professional associations upgrade the company's network.

D.

Professional associations give feedback to management.

Full Access
Question # 10

An organization wants to secure remote access to its servers and is looking for a secure protocol that can provide encryption and strong authentication. The organization wants to ensure that its servers can only be accessed by authorized users and that the data exchanged during the session is encrypted.

Which protocol meets the needs of the organization?

A.

Hypertext Transfer Protocol (HTTP)

B.

File Transfer Protocol (FTP)

C.

Telnet

D.

Secure Shell (SSH)

Full Access
Question # 11

A company has recently implemented a hybrid cloud deployment. The security team has been notified about thousands of failed attempts to connect to routers and switches in the on-premises network. A solution must be implemented to block connections after three unsuccessful SSH attempts on any network device.

A.

Firewall

B.

Data Loss Prevention

C.

Intrusion Prevention System (IPS)

Full Access
Question # 12

An IT organization needs to enable secure communication across virtual networks in Microsoft Azure and Amazon Web Services. Which protocol will offer the most reliable and secure method for data transport?

A.

File Transfer Protocol (FTP)

B.

Secure Shell (SSH)

C.

Internet Protocol Security (IPsec)

Full Access
Question # 13

A professional services organization deployed security edge devices in key locations on its corporate network.

How will these devices improve the organization's security posture?

A.

They act as an initial defense layer for potential threats

B.

They protect from severe distributed denial-of-service (DDoS) attacks

C.

They act as a security information and event management (SIEM) module for a security operations center (SOC) analyst

D.

They are a set of trusted platform module (TPM) devices

Full Access
Question # 14

Which risk management strategy will ensure that data stored on an enterprise resource planning (ERP) system is secure from exploitation in the event of a data breach?

A.

Enforcement of a strict firewall policy to restrict access to the ERP system's server

B.

Configuration of the ERP system to disable all printing services on all workstations

C.

Implementation of regular backup and disaster recovery planning

D.

Implementation of data encryption

Full Access
Question # 15

When is it better to purchase software rather than build a software solution in-house?

A.

When the company has very specific needs

B.

When the company wants internal growth

C.

When there is a short timeline

D.

When the company wants to develop the skill sets of its internal IT staff

Full Access
Question # 16

Which risk management strategy will ensure the secure storage of data on a new document management system?

A.

Incorporation of a strict firewall policy to restrict access to the system’s server

B.

Configuration of the system to require frequent password changes

C.

Implementation of encryption for all data stored in the system

D.

Implementation of a secure Virtual Private Network (VPN) connection for all remote access to the system

Full Access
Question # 17

The security team has been tasked with selecting a password complexity policy for the organization.

Which password complexity policy option should be recommended?

A.

Twelve characters with no symbols or numbers

B.

Sixteen characters with at least one letter, one number, and one symbol

C.

Four characters with at least one letter or one number

D.

Eight characters with no symbols or numbers

Full Access
Question # 18

A healthcare organization would like to work with another healthcare organization without needing to maintain identified accounts for members of the other organization.

Which technology concept should the company use?

A.

Cloud identity provider

B.

Single sign-on (SSO)

C.

Multi-factor authentication (MFA)

D.

Federated authentication

Full Access
Question # 19

A retail company has recently implemented a new point of sale (POS) system that is critical to its business.

Which security control is essential for protecting the availability of the POS system?

A.

Backing up the data stored in the POS system and having a disaster recovery plan

B.

Regularly updating the POS system with the latest security patches

C.

Implementing intrusion detection and prevention systems

D.

Enforcing strict access controls on the POS system

Full Access
Question # 20

An IT organization has recently implemented a hybrid cloud deployment. The server team is deploying a new set of domain-joined Windows servers on cloud-based virtual machines. Users must be able to use their Active Directory credentials to sign in to applications regardless of whether they are running on Windows servers in the cloud or on-premises.

Which solution should be implemented to meet the requirements?

A.

Two-step verification

B.

Challenge-Handshake Authentication Protocol (CHAP)

C.

Privileged identity management

D.

Identity federation

Full Access
Question # 21

A government agency is evaluating its business continuity plan to ensure that its operations can continue during a crisis.

What is the term used to describe the critical services that must be maintained during a disruption?

A.

Business continuity planning (BCP)

B.

Disaster recovery (DR)

C.

Recovery point objective (RPO)

D.

Mission essential functions (MEFs)

Full Access
Question # 22

A professional services organization deployed security edge devices in key locations on its corporate network.

How will these devices improve the organization’s security posture?

A.

They act as an initial defense layer for potential threats

B.

They are a set of Trusted Platform Module (TPM) devices

C.

They protect from severe Distributed Denial-of-Service (DDoS) attacks

D.

They act as a Security Information and Event Management (SIEM) module for a SOC analyst

Full Access
Question # 23

The DevSecOps team for an organization manages a continuous integration and continuous deployment (CI/CD) pipeline for a three-tier web application. Management has asked the team to perform a series of comprehensive post-deployment tests to make sure that all of the components of the application can interact and function properly.

A.

Dynamic code analysis

B.

Integration testing

C.

Static code analysis

D.

Package scanning

Full Access
Question # 24

A cybersecurity analyst at a healthcare organization was tasked with analyzing the indicators of compromise (IOCs) to identify potential threats and vulnerabilities within the enterprise. Theanalyst notices unknown users logging on to the company's wireless local-area network (WLAN).

What is a potential vulnerability the healthcare organization is facing based on the IOCs identified?

A.

Unsecured wireless access points

B.

Up-to-date anti-malware software

C.

A strong password policy

D.

Regular security awareness training for employees

Full Access
Question # 25

A cloud service provider is concerned about the potential risks associated with hardware-based attacks on its virtual machines. The provider has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this provider?

A.

Conducting regular vulnerability assessments and penetration testing

B.

Disabling central processing unit (CPU) virtualization support

C.

Implementing a web application firewall to monitor incoming traffic

D.

Enforcing strict access control policies for all users

Full Access
Question # 26

A company has discovered a vulnerability in its Domain Name System (DNS) that could allow attackers to redirect users to malicious websites. The company has decided to implement a risk management strategy to mitigate this vulnerability.

What is the most effective risk management strategy for this vulnerability?

A.

Increasing the frequency of DNS server patching

B.

Conducting regular security awareness training for employees on the risks of phishing attacks

C.

Implementing Domain Name System Security Extensions (DNSSEC) to digitally sign DNS responses and prevent DNS spoofing attacks

D.

Restricting DNS access to trusted Internet Protocol (IP) addresses only

Full Access
Question # 27

An IT organization recently implemented a hybrid cloud deployment. The security team must be able to correlate event data combined from different sources in a central location.

What is the best solution?

A.

File integrity monitoring (FIM)

B.

Data loss prevention (DLP)

C.

Intrusion detection system (IDS)

D.

Security information and event management (SIEM)

Full Access
Question # 28

Which two options allow an application to access a database?

Choose 2 answers

A.

Structured Query Language (SQL)

B.

Java Database Connectivity (JDBC)

C.

Database management system (DBMS)

D.

Open Database Connectivity (ODBC) application

E.

Graphical user interface (GUI)

Full Access
Question # 29

What is a function of a proxy server?

A.

It stores files that any user of the network may wish to access.

B.

It acts as a giant cache of web pages that anyone in the organization has recently retrieved.

C.

It responds to user queries to create, manipulate, and retrieve records from a database.

D.

It responds to HTTP requests and can execute scripts to generate dynamic pages.

Full Access
Question # 30

An organization's engineering team is developing a mobile application that uses near-field communication (NFC) capabilities but wants to ensure that information communicated using this protocol remains confidential.

A.

Kerberos centralized server for token and certificate management

B.

Bluetooth device honing restrictions for increased-risk transactions

C.

Portable device management (PDM) to allow only authorized protocols

D.

Encryption to prevent man-in-the-middle and eavesdropping attacks

Full Access
Question # 31

What is true about an operating system?

A.

It is a firmware burned onto the computer mother board.

B.

It is a software program that directly supports the computer itself.

C.

It is a hardware component of the computer system.

D.

It is an application program similar to word processors.

Full Access
Question # 32

Which IT role is responsible for the installation and maintenance of hardware and software that make up a computer network?

A.

Web administrator

B.

IT manager

C.

Database support specialist

D.

Network administrator

Full Access
Question # 33

An employee needs to execute a program from the command line.

Which peripheral device should be used?

A.

Keyboard

B.

Hard drive

C.

Speaker

D.

Printer

Full Access
Question # 34

The security team manages a set of legacy firewalls that have been in production for nearly ten years. The organization recently issued a mandate requiring that all firewalls be configured with intrusion detection controls that alert the team in real time based on inbound threats.

Which solution meets these requirements?

A.

Replacing the legacy firewalls with a security information and event management (SIEM) appliance

B.

Replacing the legacy firewalls with a load balancer

C.

Replacing the legacy firewalls with next-generation firewalls (NGFWs)

D.

Replacing the legacy firewalls with a reverse proxy

Full Access
Question # 35

A financial institution is concerned about a potential data breach due to employees accessing the company network using personal devices. They have decided to implement a bring your own device (BYOD) policy to mitigate the risk.

Which risk mitigation strategy will reduce the risk of a data breach in this scenario?

A.

Blocking access to the company network from personal devices

B.

Conducting regular security audits of the company network

C.

Implementing a mobile device management (MDM) solution

D.

Providing security awareness training for employees

Full Access
Question # 36

Which type of communications media uses light waves to transmit data?

A.

Fiber optic

B.

Radio towers

C.

Twisted pair

D.

Coaxial

Full Access
Question # 37

What is scope creep?

A.

Realization that the organization staffing is inadequate

B.

The extent of the project that lacks needed requirements

C.

Small changes in a project that lead to bigger changes

D.

When the project is completed in less than the required time

Full Access
Question # 38

A large multinational corporation maintains a complex network of data centers across the world.

Which type of disaster recovery site will ensure business continuity in case of a disaster?

A.

A mobile data center that can be deployed to the disaster zone

B.

A fully equipped hot site with up-to-date hardware and software

C.

A secondary location with basic backup hardware and software

D.

A remote location with cloud-based backups

Full Access
Question # 39

A company wants to improve the security of its software development process and reduce the risk of vulnerabilities in its applications. The company is looking for a solution that can isolate its applications and provide a secure environment for development and testing.

Which security technology meets the needs of this company?

A.

Data loss prevention (DLP)

B.

Virtual private network (VPN)

C.

Firewall

D.

Containerization

Full Access
Question # 40

A cloud hosting provider is concerned about the potential risks associated with attacks that target the confidentiality and integrity of sensitive data stored on its servers’ volatile memory. The provider has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this provider?

A.

Implementing secure encrypted enclaves and AMD Secure Memory Encryption

B.

Enforcing a strong password complexity policy for all user accounts

C.

Implementing a next-generation antivirus system to detect and prevent malware attacks

D.

Conducting regular security awareness training for all employees

Full Access
Question # 41

Which is true about access rights?

A.

They limit users to permitted items.

B.

They are part of the System Development Life Cycle.

C.

They require the use of a compiler.

D.

They are defined by the machine language.

Full Access
Question # 42

What is a component of IT infrastructure?

A.

Data

B.

People

C.

Networks

D.

Printer

Full Access
Question # 43

An e-learning company uses Amazon Simple Storage Service (Amazon S3) to store e-books and video files that are served to customers through a custom application. The company has realized that someone has been stealing its intellectual property. Which threat actor is most likely in this scenario?

A.

Competitor

B.

Hacktivist

C.

Advanced Persistent Threat

D.

Novice hacker

Full Access
Question # 44

Which encryption technique can be used to enable a third-party provider to perform calculations on encrypted data without decrypting the data?

A.

Homomorphic encryption

B.

Secure function evaluation (SFE)

C.

Secure Sockets Layer (SSL)

D.

Private information retrieval (PIR)

Full Access
Question # 45

Which item is an input device?

A.

Printer

B.

Flash Drive

C.

CD

D.

Scanner

Full Access
Question # 46

A large healthcare provider is acquiring a small clinic and has identified a full understanding of the clinic's organizational risks. The large provider has several tools it can implement to reduce the clinic's identified risks.

Which type of risk response should the healthcare provider use?

A.

Risk acceptance

B.

Risk mitigation

C.

Risk transference

D.

Risk avoidance

Full Access
Question # 47

A healthcare provider is required to comply with the Health Insurance Portability and Accountability Act (HIPAA), which sets requirements for the protection of patient healthinformation. The provider uses various software applications to manage and store patient health information, which must be coded to protect its confidentiality and integrity.

Which protocol will meet the needs of this provider?

A.

Wired Equivalent Privacy (WEP)

B.

Advanced Encryption Standard (AES)

C.

Simple Mail Transfer Protocol (SMTP)

D.

Rivest-Shamir-Adleman (RSA)

Full Access
Question # 48

In which generation were computers first built with transistors?

A.

First generation

B.

Second generation

C.

Third generation

D.

Fourth generation

Full Access
Question # 49

Which database has multiple tables with interrelated fields?

A.

Interrelated

B.

Hierarchical

C.

Flat file

D.

Relational

Full Access
Question # 50

A company recently updated its disaster recovery plan (DRP) to ensure business continuity in the event of a disruptive incident.

Which step will ensure the effectiveness of the DRP?

A.

Developing and implementing a testing plan for the DRP

B.

Reviewing and updating the DRP regularly to ensure it remains relevant

C.

Performing a risk assessment of the company's information assets

D.

Training employees on their roles and responsibilities during a disaster

Full Access
Question # 51

A healthcare organization is concerned about the potential risks associated with unauthorized access to sensitive patient information on its endpoint devices. The organization has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this organization?

A.

Enforcing strict password policies for all user accounts

B.

Conducting regular vulnerability assessments and penetration testing

C.

Implementing a network-based intrusion detection and prevention system

D.

Logging and monitoring endpoint devices

Full Access
Question # 52

While undergoing a security audit, it is determined that an organization has several backup repositories hosted in the cloud without any level of protection.

Which action should be taken to protect the backup repositories first?

A.

Audit access logs

B.

Run a vulnerability scan

C.

Restrict access to the backups

D.

Disable the backup repositories

Full Access
Question # 53

An organization wants to implement a new encryption solution to protect sensitive data stored in a database. The organization wants to ensure that the encryption solution provides strong protection for the data and is willing to sacrifice performance.

Which type of encryption meets the needs of the organization?

A.

Stream ciphers

B.

Asymmetric encryption

C.

Hash functions

D.

Block ciphers

Full Access
Question # 54

An IT organization needs to enable secure communication across virtual networks in Microsoft Azure and Amazon Web Services.

Which protocol will offer the most reliable and secure method for data transport?

A.

Transmission Control Protocol (TCP)

B.

Internet Protocol Security (IPsec)

C.

File Transfer Protocol (FTP)

D.

Secure Shell (SSH)

Full Access
Question # 55

A financial institution conducted a cybersecurity assessment, which identified several vulnerabilities including outdated software and weak password policies. The company also needs to implement a new core banking system that can handle a large number of transactions while ensuring the security of customer data.

Which risk mitigation process is the most effective approach to address these vulnerabilities, and what is the best topology for the new core banking system?

A.

Implementing security patches and updates on a regular basis and using hybrid cloud topology

B.

Installing antivirus software on all endpoints and using on-premises topology

C.

Creating strong password policies and enforcing multifactor authentication and using public cloud topology

D.

Conducting regular security audits and penetration testing and using private cloud topology

Full Access
Question # 56

Which device does a Local Area Network (LAN) need to communicate over the Internet?

A.

Multiplexer

B.

Repeater

C.

Switch

D.

Router

Full Access
Question # 57

Which peripheral replaces the mouse on a mobile device?

A.

Stylus

B.

Jack

C.

Camera

D.

USB

Full Access
Question # 58

What type of software utilizes a commercial software license?

A.

Public Domain

B.

Proprietary

C.

Open Source

D.

Shareware

Full Access
Question # 59

Which system conversion method deploys the new system while the old system is still operational in order to compare output?

A.

Phased

B.

Direct

C.

Parallel

D.

Pilot

Full Access
Question # 60

Which block cipher mode of operation for encrypting data is simple and efficient but provides no confidentiality beyond that of the underlying block cipher?

A.

Counter (CTR)

B.

Electronic Codebook (ECB)

C.

Output Feedback (OFB)

D.

Cipher Block Chaining (CBC)

Full Access
Question # 61

Which algorithm is suitable for ensuring the integrity of digital documents and detecting any unauthorized modifications?

A.

Data Encryption Standard (DES)

B.

Secure Hash Algorithm 256 (SHA-256)

C.

Advanced Encryption Standard (AES)

D.

Rivest-Shamir-Adleman (RSA)

Full Access
Question # 62

In which state is data considered information?

A.

Raw

B.

Input

C.

Unprocessed

D.

Processed

Full Access
Question # 63

Which data type should be used to calculate 90% of the retail price of an item?

A.

Floating-point

B.

String

C.

Boolean

D.

Auto-number

Full Access
Question # 64

A security engineer has been asked to audit unapproved changes that have recently taken place in a corporate application.

Which logging mechanism will create an audit trail?

A.

NetFlow logs

B.

Access logs

C.

Packet capture logs

D.

Router logs

Full Access
Question # 65

A small start-up is setting up its first network, and it needs to ensure that its network security is adequate. The start-up is aware of the latest cybersecurity threats and the need for strong security measures. In addition to network security, the start-up wants to ensure that it has a disaster recovery plan in place in case of any unexpected events.

Which approach will meet the needs of the start-up?

A.

Intrusion detection system (IDS)

B.

Packet filtering

C.

Bootstrapping

D.

Virtual private network (VPN)

Full Access
Question # 66

The security team has been notified about multiple man-in-the-middle (MITM) attacks happening on the wireless network over the past thirty days. Management has agreed to upgrade the network infrastructure to help eliminate these attacks.

A.

Security information and event management (SIEM)

B.

Inline network encryptor

C.

Layer 3 switch

D.

Wireless intrusion prevention system (WIPS)

Full Access
Question # 67

An organization's board of directors is reviewing the risk register and attempting to evaluate whether there is too much risk for the organization.

Which metric should the board review?

A.

Risk appetite

B.

Risk evaluation plan

C.

Risk treatment plan

D.

Risk tolerance

Full Access
Question # 68

A company wants to secure its computer systems and prevent any unauthorized access to its network. The company wants to implement a security solution that can restrict network traffic to only approved services and applications.

Which security technology will meet the needs of this company?

A.

Antivirus tools

B.

Two-factor authentication

C.

Host-based firewall

D.

Hardware security module (HSM)

Full Access
Question # 69

How can the organizational culture support ethical guidelines?

A.

By outlining the roles of IT specialists in the organization

B.

By outlining the protocols to support security and privacy of data

C.

By creating the system requirements for computers in the organization

D.

By creating the government regulations that apply to the organization

Full Access