Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

Cybersecurity-Architecture-and-Engineering WGU Cybersecurity Architecture and Engineering (KFO1/D488) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your WGU Cybersecurity-Architecture-and-Engineering WGU Cybersecurity Architecture and Engineering (KFO1/D488) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

What does the following SQL statement produce when executed?

SELECT ‘ FROM Customers

WHERE State = 'Arizona';

A.

All of the records from the Customers table

B.

All of the records from the Customers database

C.

All of the records from the Customers database that are located in Arizona

D.

All of the records from the Customers table that are located in Arizona

A company has discovered a vulnerability in its domain name system (DNS) that could allow attackers to redirect users to malicious websites. The company has decided to implement a risk management strategy to mitigate this vulnerability.

What is the most effective risk management strategy for this vulnerability?

A.

Restricting DNS access to trusted internet protocol (IP) addresses only

B.

Implementing domain name system security extensions (DNSSEC) to digitally sign DNS responses and prevent DNS spoofing attacks

C.

Increasing the frequency of DNS server patching

D.

Conducting regular security awareness training for employees on the risks of phishing attacks

Which IT department goal would support business goals?

A.

Overseeing funds flowing through the organization

B.

Developing an online shopping cart for company products

C.

Promoting the company's products and services

D.

Interviewing applicants for marketing positions

In which generation were computers first built with transistors?

A.

First generation

B.

Second generation

C.

Third generation

D.

Fourth generation

A company has recently experienced a data breach from an insider threat and wants to implement a policy to reduce the risk of similar incidents in the future. During the incident, the insider threat accessed sensitive information stored in the administrator account from their user account. The insider threat was not in a supervisory role at the time of the incident.

Which policy should the company implement?

A.

Password complexity policy

B.

Separation of duties

C.

Least privilege

D.

Job rotation

Which block cipher mode of operation for encrypting data is simple and efficient and provides no confidentiality beyond that of the underlying block cipher?

A.

Electronic codebook (ECB)

B.

Cipher block chaining (CBC)

C.

Counter (CTR)

D.

Output feedback (OFB)

What is the typical organizing principle of a database?

A.

Selective

B.

Projection

C.

Relational

D.

Modular

A company wants to improve the security of its software development process and reduce the risk of vulnerabilities in its applications. The company is looking for a solution that can isolate its applications and provide a secure environment for development and testing.

Which security technology meets the needs of this company?

A.

Data loss prevention (DLP)

B.

Virtual private network (VPN)

C.

Firewall

D.

Containerization

Which type of communications media uses light waves to transmit data?

A.

Fiber optic

B.

Radio towers

C.

Twisted pair

D.

Coaxial

What is the role of the compiler?

A.

To take the most recent line of code, translate it, and execute the machine code

B.

To create an executable program by translating all of the code at one time

C.

To run scripting languages to test one line of code at a time

D.

To create executable code that is compatible with different operating systems

An IT organization has recently migrated its servers to the cloud. The security team needs to delegate administrative control of multiple cloud services to various administrators inside the company. This team needs a granular solution that will offer the most flexibility while maintaining a secure posture.

What is the best solution?

A.

Open Authorization (OAuth)

B.

Security Assertion Markup Language (SAML)

C.

Role-based access control (RBAC)

D.

Kerberos

A project manager is working on a project that involves securing the network of a tall building. The manager is tasked with managing these risks effectively to ensure the successful completion of the project within a given time frame and budget. The manager identified multiple potential risks associated with the project.

What is the next step in the risk management life cycle?

A.

Identify

B.

Review

C.

Assess

D.

Control

A company is planning to implement a new cloud-based system to store sensitive customer information.

What should be identified in the first step of the risk management process for this project?

A.

Possible threats to the new system

B.

Potential business impacts of a security breach

C.

Potential vulnerabilities of the new system

D.

Business assets that will be stored in the new system

What is the vocabulary and set of rules for instructing a computer to perform certain tasks?

A.

Low-level language

B.

Translator language

C.

Machine language

D.

Programming language

Copyright © 2014-2025 Solution2Pass. All Rights Reserved