Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

Cybersecurity-Architecture-and-Engineering WGU Cybersecurity Architecture and Engineering (KFO1/D488) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your WGU Cybersecurity-Architecture-and-Engineering WGU Cybersecurity Architecture and Engineering (KFO1/D488) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

A government agency is planning a hybrid cloud deployment. Strict controls must be in place that can label classified data. The solution must ensure that access rights will be granted based on the user's government security classification.

Which type of access control should be used?

A.

Mandatory access control (MAC)

B.

Attribute-based access control (ABAC)

C.

Discretionary access control (DAC)

D.

Role-based access control (RBAC)

Which encryption technique can be used to enable a third-party provider to perform calculations on encrypted data without decrypting the data?

A.

Homomorphic encryption

B.

Secure function evaluation (SFE)

C.

Secure Sockets Layer (SSL)

D.

Private information retrieval (PIR)

A company is concerned about advanced persistent threats and wants to implement a security solution that can detect any unusual actions. The company wants to analyze the actions and trends of users and entities to identify any potential security risks.

Which security technology meets the needs of the company?

A.

User and entity behavior analytics (UEBA)

B.

Hardware security module (HSM)

C.

Antivirus tools

D.

Two-factor authentication

Which software allows the user to easily access the hardware of a computer?

A.

Productivity

B.

FTP client

C.

Application

D.

Operating system

A government agency is required to comply with the Federal Information Security Modernization Act (FISMA), which establishes security requirements for federal information systems. The agency needs to secure its external network, which connects to the internet and is used by employees, contractors, and other authorized personnel.

Which security control will secure the external network and protect against unauthorized access?

A.

Intrusion detection and prevention

B.

Firewall

C.

Access controls

D.

Network segmentation

A company recently updated its disaster recovery plan (DRP) to ensure business continuity in the event of a disruptive incident.

Which step will ensure the effectiveness of the DRP?

A.

Developing and implementing a testing plan for the DRP

B.

Reviewing and updating the DRP regularly to ensure it remains relevant

C.

Performing a risk assessment of the company's information assets

D.

Training employees on their roles and responsibilities during a disaster

What is an information system?

A.

The hardware that allows human-computer interactions

B.

A database utility from a third party

C.

The computer hardware components

D.

A collection of data to support an organization

Which two languages are scripted?

Choose 2 answers

A.

Python

B.

Ada

C.

PHP

D.

C

A company is concerned about the potential risks associated with unauthorized modifications to the basic input/output system (BIOS) firmware on its servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which technique will prevent unauthorized modifications to the BIOS firmware on a server?

A.

BIOS monitoring

B.

Using an intrusion detection system to detect and prevent attacks

C.

Conducting regular backups of the server's data

D.

BIOS protection

Which risk management strategy will ensure the secure storage of data on a new document management system?

A.

Configuration of the system to require frequent password changes

B.

Incorporation of a strict firewall policy to restrict access to the system’s server

C.

Implementation of encryption for all data stored in the system

D.

Implementation of a secure virtual private network (VPN) connection for all remote access to the system

Which device does a Local Area Network (LAN) need to communicate over the Internet?

A.

Multiplexer

B.

Repeater

C.

Switch

D.

Router

A healthcare organization has experienced a ransomware attack that has resulted in the encryption of all patient medical records. The organization has backups, but restoring the data will take severaldays, and during that time, patient care will be significantly diminished.

What is the most important factor to consider when evaluating the severity of the ransomware attack?

A.

Threat actors

B.

Risk

C.

Impact

D.

Likelihood

What is a function of a compiler?

A.

It translates a source code and creates an executable program that may be run at a later time.

B.

It takes the most recent instruction and translates it as machine language.

C.

It takes a program written in a high-level language and converts it to a different high-level language program.

D.

It gathers together multiple executable programs and translates them into a readable format.

Which database has multiple tables with interrelated fields?

A.

Interrelated

B.

Hierarchical

C.

Flat file

D.

Relational

How does application software differ from operating systems?

Choose 2 answers

A.

Application software includes system utilities that run on demand of the user.

B.

Application software consists of programs that end users run to accomplish business or personal tasks, such as e-mail.

C.

Application software includes word processors and spreadsheet software that are useful to end users.

D.

Application software supports the computer hardware system directly.

Which risk management strategy will ensure that data stored on an enterprise resource planning (ERP) system is secure from exploitation in the event of a data breach?

A.

Enforcement of a strict firewall policy to restrict access to the ERP system's server

B.

Configuration of the ERP system to disable all printing services on all workstations

C.

Implementation of regular backup and disaster recovery planning

D.

Implementation of data encryption

What is scope creep?

A.

Realization that the organization staffing is inadequate

B.

The extent of the project that lacks needed requirements

C.

Small changes in a project that lead to bigger changes

D.

When the project is completed in less than the required time

What type of a system requirement involves preventing unauthorized access to data?

A.

Accessibility

B.

Design

C.

User needs

D.

Security

An organization is experiencing multiple instances of attempted access from geographical locations where there are no corporate offices or staff.

What should a network administrator do to prevent further access attempts?

A.

Adjust the rule sets within the security information and event manager (SIEM) tool

B.

Adjust the Domain Name Service (DNS) server A Records

C.

Adjust the firewall configuration to drop traffic from these addresses

D.

Adjust the main proxy server to only allow specific addresses

How do data support an organization's business goals?

A.

Data create opportunities to compete for potential customers.

B.

Data can be manipulated to support desired outcomes.

C.

Data provide information for business decisions.

D.

Data ensure an organization's business goals are met.

Copyright © 2014-2025 Solution2Pass. All Rights Reserved