Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

Cybersecurity-Architecture-and-Engineering Exam Dumps - WGU Courses and Certificates Questions and Answers

Question # 24

A financial institution is concerned about a potential data breach due to employees accessing the company network using personal devices. They have decided to implement a bring your own device (BYOD) policy to mitigate the risk.

Which risk mitigation strategy will reduce the risk of a data breach in this scenario?

Options:

A.

Blocking access to the company network from personal devices

B.

Conducting regular security audits of the company network

C.

Implementing a mobile device management (MDM) solution

D.

Providing security awareness training for employees

Buy Now
Question # 25

An IT organization needs to enable secure communication across virtual networks in Microsoft Azure and Amazon Web Services. Which protocol will offer the most reliable and secure method for data transport?

Options:

A.

File Transfer Protocol (FTP)

B.

Secure Shell (SSH)

C.

Internet Protocol Security (IPsec)

Buy Now
Question # 26

Which statement best describes the purpose of a business intelligence (Bl) system?

Options:

A.

A Bl system allows access to raw data.

B.

A Bl system uses only proprietary data to maximize quality.

C.

A Bl system integrates all departments in an organization.

D.

A Bl system helps the strategic decision-making process.

Buy Now
Question # 27

Which risk management strategy will ensure the secure configuration and deployment of a new supply chain management system and prevent identity theft?

Options:

A.

Use of a strict firewall policy to restrict access to the system’s server

B.

Implementation of multifactor authentication for all user accounts

C.

Implementation of regular vulnerability scans and patch management

D.

Configuration of the system to disable all USB ports on all workstations

Buy Now
Question # 28

Which encryption technique can be used to enable a third-party provider to perform calculations on encrypted data without decrypting the data?

Options:

A.

Homomorphic encryption

B.

Secure function evaluation (SFE)

C.

Secure Sockets Layer (SSL)

D.

Private information retrieval (PIR)

Buy Now
Question # 29

Match the legislative purpose with the corresponding legislation.

Answer options may be used more than once or not at all.

Options:

Buy Now
Question # 30

A company is moving its applications to the cloud and is concerned about cyber security threats. The security team has been tasked with providing a comprehensive view of how attackers gainaccess, move through networks, and carry out attacks.

Which framework identifies the seven phases of an attack, from initial infiltration to post-exploitation?

Options:

A.

Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) for industrial control systems (ICS)

B.

MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK)

C.

Cyber kill chain

D.

Diamond Model of Intrusion Analysis

Buy Now
Question # 31

An IT organization is deploying a new secure Simple Mail Transfer Protocol (SMTP) server to handle email communications for the company. The company must ensure that the servers are secure and protected from external threats. The SMTP servers should be able to communicate with the internal network and the internet, but all incoming and outgoing traffic should be inspected and filtered to prevent cyberattacks.

Options:

A.

Block Transmission Control Protocol (TCP) port 25 on the firewall

B.

Open Transmission Control Protocol (TCP) port 25 on the firewall

C.

Deploy a firewall in front of the SMTP servers

D.

Deploy the SMTP servers in a demilitarized zone (DMZ) between two firewalls

Buy Now
Question # 32

Which security technique should be used to prevent data exfiltration?

Options:

A.

Intrusion Detection Software (IDS)

B.

Data Loss Prevention (DLP)

C.

Multi-Factor Authentication (MFA)

D.

Intrusion Prevention Software (IPS)

Buy Now
Question # 33

A software development company is concerned about the potential risks associated with exploits that target vulnerabilities in the Linux operating system used by the company's servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

Options:

A.

Implementing a host-based intrusion detection and prevention system

B.

Enforcing strict access control policies for all users

C.

Implementing shell restrictions

D.

Conducting regular security assessments and penetration testing

Buy Now
Exam Name: WGU Cybersecurity Architecture and Engineering (KFO1/D488)
Last Update: Jun 15, 2025
Questions: 232
Cybersecurity-Architecture-and-Engineering pdf

Cybersecurity-Architecture-and-Engineering PDF

$29.75  $84.99
Cybersecurity-Architecture-and-Engineering Engine

Cybersecurity-Architecture-and-Engineering Testing Engine

$33.25  $94.99
Cybersecurity-Architecture-and-Engineering PDF + Engine

Cybersecurity-Architecture-and-Engineering PDF + Testing Engine

$47.25  $134.99