Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dealsixty

Cybersecurity-Architecture-and-Engineering Exam Dumps - WGU Courses and Certificates Questions and Answers

Question # 14

Which IT role is responsible for installing new hardware and troubleshooting existing hardware?

Options:

A.

Web administrator

B.

System administrator

C.

Security administrator

D.

Network administrator

Buy Now
Question # 15

After implementing a risk management plan for a new product launch, a project team conductedregular risk assessments to monitor the effectiveness of their control strategies.

Which step of the risk management life cycle was performed?

Options:

A.

Control

B.

Assess

C.

Identify

D.

Review

Buy Now
Question # 16

Which stream cipher is a variant of the Salsa20 cipher, designed to be fast, secure, and resistant to cryptanalysis, and is commonly used in combination with the Poly1305 authentication mode?

Options:

A.

Counter (CTR)

B.

Cipher block chaining (CBC)

C.

ChaCha

D.

Electronic codebook (ECB)

Buy Now
Question # 17

A security engineer has been asked to audit unapproved changes that have recently taken place in a corporate application.

Which logging mechanism will create an audit trail?

Options:

A.

NetFlow logs

B.

Access logs

C.

Packet capture logs

D.

Router logs

Buy Now
Question # 18

A company has discovered a vulnerability in its lightweight directory access protocol (LDAP) implementation, which could potentially allow unauthorized access to sensitive information. The company has decided to implement risk mitigation strategies to reduce the risk associated with this vulnerability.

Which risk mitigation strategy will meet the needs of the company?

Options:

A.

Conducting regular security awareness training for employees to prevent social engineering attacks targeting LDAP credentials

B.

Regularly backing up data stored in the LDAP server to prevent data loss in the event of a breach

C.

Implementing intrusion detection and prevention systems (IDPS) to monitor for suspicious activities and potential LDAP attacks

D.

Implementing strong authentication mechanisms and encryption protocols to secure communication between the LDAP server and clients

Buy Now
Question # 19

A company is developing a new system to process personal information about its customers, including their names, addresses, and purchase histories.

Which term describes the process of identifying and evaluating the potential effects that the new system may have on the privacy of personal information and developing strategies to mitigate those risks?

Options:

A.

Data Protection Impact Assessment (DPIA)

B.

Business Continuity Planning (BCP)

C.

Risk Management

D.

Disaster Recovery (DR)

Buy Now
Question # 20

Which algorithm is suitable for ensuring the integrity of digital documents and detecting any unauthorized modifications?

Options:

A.

Data Encryption Standard (DES)

B.

Secure Hash Algorithm 256 (SHA-256)

C.

Advanced Encryption Standard (AES)

D.

Rivest-Shamir-Adleman (RSA)

Buy Now
Question # 21

An IT organization has recently suffered multiple data breaches. The security operations center (SOC) team has been tasked with preventing future breaches by implementing user monitoring. The proposed solution must provide insights about unusual user behaviors from a variety of internal corporate resources.

Options:

A.

Secure Shell (SSH) Protocol

B.

Security information and event management (SIEM)

C.

Virtual private network (VPN)

D.

Web application firewall (WAF)

Buy Now
Question # 22

What are two differences between a handheld computer and a desktop?

Choose 2 answers.

Options:

A.

A handheld has more memory.

B.

A desktop has more memory.

C.

A desktop has more internal storage.

D.

A handheld has more internal storage.

Buy Now
Question # 23

The development team has requested permission to use several open-source libraries to build a corporate web application.

Which resource can the security team recommend to ensure these libraries can be trusted?

Options:

A.

Agile software development

B.

Waterfall software development

C.

Common Vulnerabilities and Exposures (CVE)

D.

Continuous delivery

Buy Now
Exam Name: WGU Cybersecurity Architecture and Engineering (KFO1/D488)
Last Update: Jun 15, 2025
Questions: 232
Cybersecurity-Architecture-and-Engineering pdf

Cybersecurity-Architecture-and-Engineering PDF

$34  $84.99
Cybersecurity-Architecture-and-Engineering Engine

Cybersecurity-Architecture-and-Engineering Testing Engine

$38  $94.99
Cybersecurity-Architecture-and-Engineering PDF + Engine

Cybersecurity-Architecture-and-Engineering PDF + Testing Engine

$54  $134.99