Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

Cybersecurity-Architecture-and-Engineering WGU Cybersecurity Architecture and Engineering (KFO1/D488) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your WGU Cybersecurity-Architecture-and-Engineering WGU Cybersecurity Architecture and Engineering (KFO1/D488) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

What allows a user to query information from an online database with a web application without revealing what they are viewing?

A.

Secure function evaluation (SFE)

B.

Private function evaluation (PFE)

C.

Homomorphic encryption

D.

Private information retrieval (PIR)

A healthcare organization would like to work with another healthcare organization without needing to maintain identified accounts for members of the other organization.

Which technology concept should the company use?

A.

Cloud identity provider

B.

Single sign-on (SSO)

C.

Multi-factor authentication (MFA)

D.

Federated authentication

A company may choose to use CDs, DVDs, hard drives, or even cloud storage for data backup.

Which aspect of data backup does this statement describe?

A.

Data mirroring

B.

Incremental backups

C.

Image backups

D.

Backup media

A company is concerned about the security of its users’ passwords and is looking for a solution to ensure that user credentials are kept safe.

What is the best solution?

A.

Object storage

B.

Password policies

C.

Removable storage

D.

Hardware key manager

Which IT role is responsible for installing new hardware and troubleshooting existing hardware?

A.

Web administrator

B.

System administrator

C.

Security administrator

D.

Network administrator

An organization wants to secure remote access to its servers and is looking for a secure protocol that can provide encryption and strong authentication. The organization wants to ensure that its servers can only be accessed by authorized users and that the data exchanged during the session is encrypted.

Which protocol meets the needs of the organization?

A.

Hypertext Transfer Protocol (HTTP)

B.

File Transfer Protocol (FTP)

C.

Telnet

D.

Secure Shell (SSH)

What is a common characteristic of a proprietary software license?

A.

A business gains the right to modify the software's source code.

B.

A business gains the right to use the software.

C.

A business gains the right to own the software.

D.

A business gains the right to distribute the software freely.

Which statement best describes the purpose of a business intelligence (Bl) system?

A.

A Bl system allows access to raw data.

B.

A Bl system uses only proprietary data to maximize quality.

C.

A Bl system integrates all departments in an organization.

D.

A Bl system helps the strategic decision-making process.

Which technique allows someone to obtain a password while it is in transit?

A.

Packet sniffing

B.

Buffer overflow

C.

Phishing

D.

Black hat

Which risk management strategy will ensure the secure configuration and deployment of a new supply chain management system and prevent identity theft?

A.

Use of a strict firewall policy to restrict access to the system’s server

B.

Configuration of the system to disable all universal serial bus (USB) ports on all workstations

C.

Implementation of regular vulnerability scans and patch management

D.

Implementation of multifactor authentication for all user accounts

A software development company is required to comply with the Payment Card Industry Data Security Standard (PCI DSS), which sets requirements for the protection of cardholder data. The company uses Secure Shell (SSH) to connect to its cloud-based development environment, which contains cardholder data.

Which security control will meet the needs of the company?

A.

Patch management

B.

Network segmentation

C.

Strong authentication

D.

Vulnerability analysis

Why are businesses beginning to use big data?

A.

To store enormous amounts of paper documents and electronic data in databases and data warehouses for future analysis

B.

To collect large amounts of data from various sources, both external and internal, both paper and electronic

C.

To integrate vast amounts of electronic data into analysis in order to gain insight for better decision making

D.

To connect a myriad of devices to the Internet and allow these devices to logically interact with one another

Which is true about access rights?

A.

They limit users to permitted items.

B.

They are part of the System Development Life Cycle.

C.

They require the use of a compiler.

D.

They are defined by the machine language.

Which risk management strategy will supplement privacy requirements for data on an electronic health record (EHR) system?

A.

Configuration of the system to disable universal serial bus (USB) ports on all workstations

B.

Encryption of all network traffic between the EHR system and external networks

C.

Implementation of role-based access controls and encryption of all sensitive data

D.

Implementation of a strict firewall policy to restrict access to the system's server

A security team is investigating multiple man-in-the-middle attacks that have taken place on the corporate network over the past few months. The team needs a solution that will ensure that data is not exposed if a man-in-the-middle attack occurs in the future.

What is the best solution?

A.

Disabling Wi-Fi connections

B.

Enforcing password history

C.

Encrypting data

D.

Ensuring all users have complex passwords

A government agency needs to deploy a secure network connection between its offices in Chicago and New York.

What should be used to facilitate this connection?

A.

Virtual private network (VPN)

B.

Security information and event management (SIEM)

C.

Point-to-Point Tunneling Protocol (PPTP)

D.

Network access control (NAC)

What is the purpose of the feature that allows only one user to modify a document at a time in collaboration software?

A.

Data availability

B.

Data integrity

C.

Data confidentiality

D.

Data accessibility

An application team manages a large farm of web servers on virtual machines in the cloud. The team wants to reduce the server load by caching static content. Adding a second layer of protection is also a requirement.

What should this team recommend in this scenario?

A.

Firewall rule changes

B.

Intrusion detection system (IDS)

C.

Reverse proxy

D.

Network address translation (NAT)

What is a characteristic of algorithms?

A.

No starting or stopping point

B.

Random instructions

C.

Unambiguous rules

D.

Constantly changing

A software company is reviewing its disaster recovery plan and wants to identify the criticality of its business processes to prioritize its recovery efforts.

Which will determine the criticality of its business processes?

A.

Business continuity planning (BCP)

B.

Business impact analysis (BIA)

C.

Disaster recovery (DR)

D.

Incident response (IR)

Copyright © 2014-2025 Solution2Pass. All Rights Reserved