Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

WGU Cybersecurity-Architecture-and-Engineering WGU Cybersecurity Architecture and Engineering (KFO1/D488) Exam Practice Test

Page: 1 / 23
Total 232 questions

WGU Cybersecurity Architecture and Engineering (KFO1/D488) Questions and Answers

Question 1

Which technique allows someone to obtain a password while it is in transit?

Options:

A.

Packet sniffing

B.

Buffer overflow

C.

Phishing

D.

Black hat

Question 2

Which risk management strategy will help prevent cheating using a learning management system as a platform?

Options:

A.

Implementation of secure user authentication protocols

B.

Implementation of regular software updates and patch management

C.

Enforcement of a strict firewall policy to restrict access to the system’s server

D.

Configuration of the system to disable all Bluetooth services on all workstations

Question 3

A cloud hosting provider is concerned about the potential risks associated with attacks that target the confidentiality and integrity of sensitive data stored on its servers' volatile storage. The provider has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this provider?

Options:

A.

Implementing secure encrypted enclaves and Advanced Micro Devices (AMD) Secure Memory Encryption

B.

Conducting regular security awareness training for all employees

C.

Implementing a next-generation antivirus system to detect and prevent malware attacks

D.

Enforcing a strong password complexity policy for all user accounts

Question 4

A security team is investigating multiple man-in-the-middle attacks that have taken place on the corporate network over the past few months. The team needs a solution that will ensure that data is not exposed if a man-in-the-middle attack occurs in the future.

What is the best solution?

Options:

A.

Disabling Wi-Fi connections

B.

Enforcing password history

C.

Encrypting data

D.

Ensuring all users have complex passwords

Question 5

What are two differences between a handheld computer and a desktop?

Choose 2 answers.

Options:

A.

A handheld has more memory.

B.

A desktop has more memory.

C.

A desktop has more internal storage.

D.

A handheld has more internal storage.

Question 6

A retail company wants to establish the frequency at which it needs to back up its critical data to ensure it can be restored in case of a disruption with the least amount of acceptable data loss.

What is the term used to describe this metric?

Options:

A.

Business Impact Analysis (BIA)

B.

Continuous Data Protection (CDP)

C.

Recovery Point Objective (RPO)

D.

Disaster Recovery (DR)

Question 7

Which risk management strategy will help defeat piracy efforts on a new patient management system?

Options:

A.

Configuration of the patient management system to disable all external device connections on all workstations

B.

Incorporation of end-to-end encryption for all patient data

C.

Implementation of regular virus scanning for all workstations

D.

Implementation of licensing technologies in order to restrict unauthorized access to the system

Question 8

Which item is an input device?

Options:

A.

Printer

B.

Flash Drive

C.

CD

D.

Scanner

Question 9

Which part of the Uniform Resource Locator (URL) identifies the server on which the web page can be found?

Options:

A.

Resource path ID

B.

Domain name

C.

Protocol

D.

IP address

Question 10

An IT organization has recently suffered multiple data breaches. The security operations center (SOC) team has been tasked with preventing future breaches by implementing user monitoring. The proposed solution must provide insights about unusual user behaviors from a variety of internal corporate resources.

Options:

A.

Secure Shell (SSH) Protocol

B.

Security information and event management (SIEM)

C.

Virtual private network (VPN)

D.

Web application firewall (WAF)

Question 11

Which algorithm is suitable for ensuring the integrity of digital documents and detecting any unauthorized modifications?

Options:

A.

Data Encryption Standard (DES)

B.

Secure Hash Algorithm 256 (SHA-256)

C.

Advanced Encryption Standard (AES)

D.

Rivest-Shamir-Adleman (RSA)

Question 12

Which life cycle is part of the process for planning, creating, testing, and deploying information systems?

Options:

A.

Network Development Life Cycle (NDLC)

B.

System Development Life Cycle (SDLC)

C.

Database Creation System Life Cycle (DCSLC)

D.

Software Test Life Cycle (STLC)

Question 13

A medium-sized grocery chain with locations all across the United States has a new business requirement that all devices must authenticate to access its resources.

What should the grocery chain use for the devices to authenticate?

Options:

A.

Virtual private network (VPN)

B.

Public key infrastructure (PKI)

C.

Certificate signing

D.

Endpoint passwords

Question 14

Which encryption technique can be used to enable a third-party provider to perform calculations on encrypted data without decrypting the data?

Options:

A.

Secure Sockets Layer (SSL)

B.

Private Information Retrieval (PIR)

C.

Secure Function Evaluation (SFE)

D.

Homomorphic encryption

Question 15

A company is moving its applications to the cloud and is concerned about cyber security threats. The security team has been tasked with providing a comprehensive view of how attackers gainaccess, move through networks, and carry out attacks.

Which framework identifies the seven phases of an attack, from initial infiltration to post-exploitation?

Options:

A.

Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) for industrial control systems (ICS)

B.

MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK)

C.

Cyber kill chain

D.

Diamond Model of Intrusion Analysis

Question 16

A healthcare provider is developing a disaster recovery plan and wants to determine the longest duration that its systems or applications can be down before causing significant damage to the business.

What is the term used to describe this metric?

Options:

A.

Recovery time objective (RTO)

B.

Business impact analysis (BIA)

C.

Business continuity planning (BCP)

D.

Disaster recovery (DR)

Question 17

A company's website is suddenly redirecting users to a suspicious landing page asking for personal information.

What is the most likely cause of the issue?

Options:

A.

Exfiltration

B.

Phishing

C.

Tampering

D.

Ransomware

Question 18

The DevSecOps team for an organization manages a continuous integration and continuous deployment (CI/CD) pipeline for a three-tier web application. Management has asked the team to perform a series of comprehensive post-deployment tests to make sure that all of the components of the application can interact and function properly.

Options:

A.

Dynamic code analysis

B.

Integration testing

C.

Static code analysis

D.

Package scanning

Question 19

A project manager is working on a project that involves securing the network of a tall building. The manager is tasked with managing these risks effectively to ensure the successful completion of the project within a given time frame and budget. The manager identified multiple potential risks associated with the project.

What is the next step in the risk management life cycle?

Options:

A.

Identify

B.

Review

C.

Assess

D.

Control

Question 20

Which algorithm is suitable for ensuring the integrity of digital documents and detecting any unauthorized modifications?

Options:

A.

Rivest–Shamir–Adleman (RSA)

B.

Data Encryption Standard (DES)

C.

Advanced Encryption Standard (AES)

D.

Secure Hash Algorithm 256 (SHA-256)

Question 21

A financial institution conducted a cybersecurity assessment, which identified several vulnerabilities including outdated software and weak password policies. The company also needs to implement a new core banking system that can handle a large number of transactions while ensuring the security of customer data.

Which risk mitigation process is the most effective approach to address these vulnerabilities, and what is the best topology for the new core banking system?

Options:

A.

Implementing security patches and updates on a regular basis and using hybrid cloud topology

B.

Installing antivirus software on all endpoints and using on-premises topology

C.

Creating strong password policies and enforcing multifactor authentication and using public cloud topology

D.

Conducting regular security audits and penetration testing and using private cloud topology

Question 22

Management has asked its networking team to recommend a solution for direct communication between multiple virtual networks in the cloud. The solution must utilize the least amount of administrative effort.

Options:

A.

Remote Desktop Protocol (RDP)

B.

Virtual network peering

C.

Domain Name System (DNS)

D.

Virtual Local Area Network (VLAN)

Question 23

An IT organization has recently implemented a hybrid cloud deployment. The server team is deploying a new set of domain-joined Windows servers on cloud-based virtual machines. Users must be able to use their Active Directory credentials to sign in to applications regardless of whether they are running on Windows servers in the cloud or on-premises.

Options:

A.

Identity federation

B.

Privileged identity management

C.

Challenge-Handshake Authentication Protocol (CHAP)

D.

Two-step verification

Question 24

A system analyst is reviewing risk documents and noticed that the date of many risks are more than three years old.

What should be proposed to leadership regarding these risks?

Options:

A.

A process to reassess risks on a defined schedule

B.

A process to confirm that risk documents are readily available to all individuals

C.

A process to evaluate how risks are captured on risk documents

D.

A process to determine how involved leadership is in assignment risk scores

Question 25

A cybersecurity analyst at a manufacturing company is tasked with analyzing the indicators of compromise (IOCs) to identify potential threats and vulnerabilities within the organization. While viewing the security information and event management (SIEM), the analyst notices an unknown IP address logging on to the company's Secure Shell (SSH) server.

Which potential vulnerability is the manufacturing company facing?

Options:

A.

Exfiltration

B.

Unpatched software

C.

Enumeration

D.

Weak passwords

Question 26

Which characteristic identifies intranet application software?

Options:

A.

Hosted by an outsourced provider

B.

Hosted in the internal business network

C.

Hosted by a third-party web portal

D.

Hosted on an individual computer

Question 27

A company recently updated its disaster recovery plan (DRP) to ensure business continuity in the event of a disruptive incident.

Which step will ensure the effectiveness of the DRP?

Options:

A.

Developing and implementing a testing plan for the DRP

B.

Reviewing and updating the DRP regularly to ensure it remains relevant

C.

Performing a risk assessment of the company's information assets

D.

Training employees on their roles and responsibilities during a disaster

Question 28

A professional services organization deployed security edge devices in key locations on its corporate network.

How will these devices improve the organization’s security posture?

Options:

A.

They act as an initial defense layer for potential threats

B.

They are a set of Trusted Platform Module (TPM) devices

C.

They protect from severe Distributed Denial-of-Service (DDoS) attacks

D.

They act as a Security Information and Event Management (SIEM) module for a SOC analyst

Question 29

The security team has been notified about multiple man-in-the-middle (MITM) attacks happening on the wireless network over the past thirty days. Management has agreed to upgrade the network infrastructure to help eliminate these attacks.

Which solution fulfills these requirements?

Options:

A.

Security information and event management (SIEM)

B.

Wireless intrusion prevention system (WIPS)

C.

Inline network encryptor

D.

Layer 3 switch

Question 30

An IT team must allow on-premises users to log in to the Azure portal using their corporate credentials.

Which strategy should be used to enable identity federation in this scenario?

Options:

A.

Encrypting with Transport Layer Security (TLS)

B.

Deploying a hardware-based two-factor authentication (2FA) solution

C.

Integrating with lightweight directory access protocol (LDAP)

D.

Configuring third-party authentication with Security Assertion Markup Language (SAML)

Question 31

A software development company has experienced a noticeable slowdown in its network performance, which suggests that some machines on the network may have been infected by a botnet. The company has decided to analyze the threats and vulnerabilities within the enterprise based on the indicators of compromise to mitigate the risk.

What should the company do to detect a botnet and other malware-based threats within the enterprise based on the indicators of compromise?

Options:

A.

Use two-factor authentication for external users

B.

Define strict firewall rules

C.

Constantly scan for known signatures on every machine

D.

Implement a configuration management solution

Question 32

The development team has requested permission to use several open-source libraries to build a corporate web application.

Which resource can the security team recommend to ensure these libraries can be trusted?

Options:

A.

Agile software development

B.

Waterfall software development

C.

Common Vulnerabilities and Exposures (CVE)

D.

Continuous delivery

Question 33

What is the role of the CPU in a computing environment?

Choose 2 answers

Options:

A.

Carrying out the instructions of a computer program

B.

Storing data as it is being processed

C.

Directing electrical current over the circuit board

D.

Connecting components to the system unit

E.

Containing an arithmetic logic unit (ALU) that performs arithmetic and logic operations

Question 34

A company has discovered a vulnerability in its lightweight directory access protocol (LDAP) implementation, which could potentially allow unauthorized access to sensitive information. The company has decided to implement risk mitigation strategies to reduce the risk associated with this vulnerability.

Which risk mitigation strategy will meet the needs of the company?

Options:

A.

Conducting regular security awareness training for employees to prevent social engineering attacks targeting LDAP credentials

B.

Regularly backing up data stored in the LDAP server to prevent data loss in the event of a breach

C.

Implementing intrusion detection and prevention systems (IDPS) to monitor for suspicious activities and potential LDAP attacks

D.

Implementing strong authentication mechanisms and encryption protocols to secure communication between the LDAP server and clients

Question 35

A security analyst for a financial institution is in the process of planning to upgrade the institution’s IT infrastructure to meet current industry standards. There are various potential risks associated with the upgrade, including data breaches, system outages, and cost overruns. The analyst is tasked with managing these risks to ensure a successful upgrade.

What is the first step in the risk management life cycle in this scenario?

Options:

A.

Assess

B.

Control

C.

Review

D.

Identify

Question 36

A small start-up is setting up its first network, and it needs to ensure that its network security is adequate. The start-up is aware of the latest cybersecurity threats and the need for strong security measures. In addition to network security, the start-up wants to ensure that it has a disaster recovery plan in place in case of any unexpected events.

Which approach will meet the needs of the start-up?

Options:

A.

Intrusion detection system (IDS)

B.

Packet filtering

C.

Bootstrapping

D.

Virtual private network (VPN)

Question 37

An organization wants to implement a new encryption solution for a real-time video conferencing application. The organization wants to ensure that the encryption solution provides protection for the video stream without causing significant delays or latency in the conference.

Which type of encryption will meet the needs of the organization?

Options:

A.

Block ciphers

B.

Asymmetric encryption

C.

Stream ciphers

D.

Hash functions

Question 38

During a vulnerability assessment, several end-of-life operating systems were discovered within the environment.

Which action should be taken to resolve the issue?

Options:

A.

Shut down and remove the end-of-life machines

B.

Disconnect the end-of-life machines

C.

Block the end-of-life machines

D.

Upgrade the remaining end-of-life machines

Question 39

An e-learning company uses Amazon Simple Storage Service (Amazon S3) to store e-books and video files that are served to customers through a custom application. The company has realized that someone has been stealing its intellectual property.

Which threat actor is most likely in this scenario?

Options:

A.

Advanced persistent threat

B.

Novice hacker

C.

Competitor

D.

Hacktivist

Question 40

Which risk management strategy will ensure the secure configuration and deployment of a new supply chain management system and prevent identity theft?

Options:

A.

Use of a strict firewall policy to restrict access to the system’s server

B.

Implementation of multifactor authentication for all user accounts

C.

Implementation of regular vulnerability scans and patch management

D.

Configuration of the system to disable all USB ports on all workstations

Question 41

A cloud service provider is concerned about the potential risks associated with hardware-based attacks on its virtual machines. The provider has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this provider?

Options:

A.

Conducting regular vulnerability assessments and penetration testing

B.

Disabling central processing unit (CPU) virtualization support

C.

Implementing a web application firewall to monitor incoming traffic

D.

Enforcing strict access control policies for all users

Question 42

A company wants to secure its computer systems and prevent any unauthorized access to its network. The company wants to implement a security solution that can restrict network traffic to only approved services and applications.

Which security technology will meet the needs of this company?

Options:

A.

Antivirus tools

B.

Two-factor authentication

C.

Host-based firewall

D.

Hardware security module (HSM)

Question 43

While undergoing a security audit, it is determined that an organization has several backup repositories nested in the cloud without any level of protection. Which action should be taken to protect the backup repositories first?

Options:

A.

Restrict access to the backups

B.

Run a vulnerability scan

C.

Disable the backup repositories

D.

Audit access logs

Question 44

Which type of systems testing includes having end users test the system with simulated data and the help of the developer?

Options:

A.

User Acceptance

B.

Beta

C.

Alpha

D.

Analysis

Question 45

A software development company is concerned about the potential risks associated with exploits that target vulnerabilities in the Linux operating system used by the company’s servers. Thecompany has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

Options:

A.

Enforcing strict access control policies for all users

B.

Implementing a host-based intrusion detection and prevention system

C.

Conducting regular security assessments and penetration testing

D.

Implementing shell restrictions

Question 46

Which risk management strategy will ensure the secure storage of data on a new document management system?

Options:

A.

Incorporation of a strict firewall policy to restrict access to the system’s server

B.

Configuration of the system to require frequent password changes

C.

Implementation of encryption for all data stored in the system

D.

Implementation of a secure Virtual Private Network (VPN) connection for all remote access to the system

Question 47

An on-call security engineer has been notified after business hours that a possible threat could be impacting production applications.

Which type of threat intelligence should be used by first responders?

Options:

A.

Tactical

B.

Commodity malware

C.

Operational

D.

Strategic

Question 48

Which security technique should be used to prevent data exfiltration?

Options:

A.

Multi-factor authentication (MFA)

B.

Intrusion detection software (IDS)

C.

Data loss prevention (DLP)

D.

Intrusion prevention software (IPS)

Question 49

What allows a user to query information from an online database with a web application without revealing what they are viewing?

Options:

A.

Secure function evaluation (SFE)

B.

Private function evaluation (PFE)

C.

Homomorphic encryption

D.

Private information retrieval (PIR)

Question 50

An e-commerce company has recently experienced a data breach in which the personal and financial information of its customers was stolen. The company is concerned about the potential for future data breaches.

What is the most important factor to consider when evaluating the potential for future data breaches in this scenario?

Options:

A.

Impact

B.

Risk

C.

Threat actors

D.

Likelihood

Question 51

Which risk management strategy will ensure that data stored on an Enterprise Resource Planning (ERP) system is secure from exploitation in the event of a data breach?

Options:

A.

Implementation of data encryption

B.

Enforcement of a strict firewall policy to restrict access to the ERP system’s server

C.

Implementation of regular backup and disaster recovery planning

D.

Configuration of the ERP system to disable all printing services on all workstations

Question 52

Which stream cipher is a variant of the Salsa20 cipher, designed to be fast, secure, and resistant to cryptanalysis, and is commonly used in combination with the Poly1305 authentication mode?

Options:

A.

Counter (CTR)

B.

Cipher block chaining (CBC)

C.

ChaCha

D.

Electronic codebook (ECB)

Question 53

What allows a user to query information from an online database with a web application without revealing what they are viewing?

Options:

A.

Private Information Retrieval (PIR)

B.

Homomorphic encryption

C.

Secure Function Evaluation (SFE)

D.

Private Function Evaluation (PFE)

Question 54

An organization sends customers e-mail messages based on their purchase patterns.

Which characteristic of quality data does this represent?

Options:

A.

Relevant

B.

Timely

C.

Thorough

D.

Accurate

Question 55

Which software allows the user to easily access the hardware of a computer?

Options:

A.

Productivity

B.

FTP client

C.

Application

D.

Operating system

Question 56

Which block cipher mode of operation for encrypting data is simple and efficient and provides no confidentiality beyond that of the underlying block cipher?

Options:

A.

Electronic codebook (ECB)

B.

Cipher block chaining (CBC)

C.

Counter (CTR)

D.

Output feedback (OFB)

Question 57

Which item information should be stored in a database to determine an order total?

Options:

A.

Item order line

B.

Item unit price

C.

Item description

D.

Item restock levels

Question 58

Which risk management strategy will ensure the secure configuration and deployment of a new online banking system and help prevent credit card fraud?

Options:

A.

Use of regular system backups to an off-site location

B.

Implementation of real-time transaction monitoring

C.

Implementation of a strict firewall policy to restrict access to the system’s server

D.

Configuration of the system to disable all email services on all workstations

Question 59

What is true about an operating system?

Options:

A.

It is a firmware burned onto the computer mother board.

B.

It is a software program that directly supports the computer itself.

C.

It is a hardware component of the computer system.

D.

It is an application program similar to word processors.

Question 60

A company has recently implemented a hybrid cloud deployment. The security team has been notified about thousands of failed attempts to connect to routers and switches in the on-premises network. A solution must be implemented to block connections after three unsuccessful SSH attempts on any network device.

Which solution meets the requirements in this scenario?

Options:

A.

Data loss prevention

B.

Firewall

C.

Intrusion prevention system

D.

File integrity monitoring

Question 61

A security team is investigating multiple man-in-the-middle (MITM) attacks that have taken place on the corporate network over the past few months. The team needs a solution that will ensure that data is not exposed if a man-in-the-middle attack occurs in the future.

Options:

A.

Enforcing password history

B.

Encrypting data

C.

Ensuring all users have complex passwords

D.

Disabling Wi-Fi connections

Question 62

Which two languages are scripted?

Choose 2 answers

Options:

A.

Python

B.

Ada

C.

PHP

D.

C

Question 63

An IT organization has seen a surge of ransomware and Trojan horse attacks recently.

Which action should the security team recommend to protect the IT infrastructure from commodity malware threats?

Options:

A.

Installing a firewall to identify malicious traffic

B.

Rerouting suspicious communications to a remote machine

C.

Implementing a two-factor authentication system

D.

Installing endpoint protection software

Question 64

What is a common characteristic of a proprietary software license?

Options:

A.

A business gains the right to modify the software's source code.

B.

A business gains the right to use the software.

C.

A business gains the right to own the software.

D.

A business gains the right to distribute the software freely.

Question 65

In which state is data considered information?

Options:

A.

Raw

B.

Input

C.

Unprocessed

D.

Processed

Question 66

A financial institution conducted a cybersecurity assessment, which identified several vulnerabilities, including outdated software and weak password policies. The company also needs to implement a new core banking system that can handle a large number of transactions while ensuring the security of customer data.

Which risk mitigation process is the most effective approach to address these vulnerabilities, and what is the best topology for the new core banking system?

Options:

A.

Creating strong password policies and enforcing multifactor authentication and using public cloud topology

B.

Implementing security patches and updates on a regular basis and using hybrid cloud topology

C.

Installing antivirus software on all endpoints and using on-premise topology

D.

Conducting regular security audits and penetration testing and using private cloud topology

Question 67

A cloud hosting provider is concerned about the potential risks associated with attacks that target the confidentiality and integrity of sensitive data stored on its servers’ volatile memory. The provider has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this provider?

Options:

A.

Implementing secure encrypted enclaves and AMD Secure Memory Encryption

B.

Enforcing a strong password complexity policy for all user accounts

C.

Implementing a next-generation antivirus system to detect and prevent malware attacks

D.

Conducting regular security awareness training for all employees

Question 68

Which security technique should be used to prevent data exfiltration?

Options:

A.

Intrusion Detection Software (IDS)

B.

Data Loss Prevention (DLP)

C.

Multi-Factor Authentication (MFA)

D.

Intrusion Prevention Software (IPS)

Question 69

Which task is the responsibility of a database administrator?

Options:

A.

Installing and configuring databases

B.

Compiling code into an executable file

C.

Deciding on database applications for the company

D.

Troubleshooting network security issues

Page: 1 / 23
Total 232 questions