Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

Cybersecurity-Architecture-and-Engineering Exam Dumps - WGU Courses and Certificates Questions and Answers

Question # 34

Management has asked its networking team to recommend a solution for direct communication between multiple virtual networks in the cloud. The solution must utilize the least amount of administrative effort.

Which solution meets the requirements?

Options:

A.

Virtual network peering

B.

Virtual local area network

C.

Remote Desktop Protocol

D.

Domain name system

Buy Now
Question # 35

An insurance agency is concerned that some employees could be mishandling funds and covering it up. The agency wants to temporarily block these employees from working and ensure that operations continue.

Which strategy should the agency implement?

Options:

A.

Separation of duties

B.

Mandatory vacation

C.

Job rotation

D.

Least privilege

Buy Now
Question # 36

A large technology company has discovered a known vulnerability in its network infrastructure. The infrastructure contains a number of retired assets that are no longer receiving security updates, which can potentially be exploited by attackers to compromise the network. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

Options:

A.

Enforcing strict access control policies for all network devices

B.

Conducting regular vulnerability scans to identify potential weaknesses

C.

Implementing intrusion detection and prevention systems (IDPS)

D.

Removing all end-of-life devices from the network

Buy Now
Question # 37

What is a function of a proxy server?

Options:

A.

It stores files that any user of the network may wish to access.

B.

It acts as a giant cache of web pages that anyone in the organization has recently retrieved.

C.

It responds to user queries to create, manipulate, and retrieve records from a database.

D.

It responds to HTTP requests and can execute scripts to generate dynamic pages.

Buy Now
Question # 38

A government agency is planning a hybrid cloud deployment. Strict controls must be in place that can label classified data. The solution must ensure that access rights will be granted based on the user's government security classification.

Which type of access control should be used?

Options:

A.

Mandatory access control (MAC)

B.

Attribute-based access control (ABAC)

C.

Discretionary access control (DAC)

D.

Role-based access control (RBAC)

Buy Now
Question # 39

A company has recently experienced a data breach in which customer information was stolen. The company is concerned about the potential for future data breaches. A review of the incident revealed that the breach originated from stolen credentials.

Which security measure will meet the needs of this company?

Options:

A.

Implementing two-factor authentication

B.

Conducting background checks on employees

C.

Providing regular security awareness training to employees

D.

Installing a security information and event management (SIEM) system

Buy Now
Question # 40

A healthcare organization would like to work with another healthcare organization without needing to maintain identified accounts for members of the other organization.

Which technology concept should the company use?

Options:

A.

Cloud identity provider

B.

Single sign-on (SSO)

C.

Multi-factor authentication (MFA)

D.

Federated authentication

Buy Now
Question # 41

A software company is reviewing its disaster recovery plan and wants to identify the criticality of its business processes to prioritize its recovery efforts.

Which will determine the criticality of its business processes?

Options:

A.

Business continuity planning (BCP)

B.

Business impact analysis (BIA)

C.

Disaster recovery (DR)

D.

Incident response (IR)

Buy Now
Question # 42

Which IT department goal would support business goals?

Options:

A.

Overseeing funds flowing through the organization

B.

Developing an online shopping cart for company products

C.

Promoting the company's products and services

D.

Interviewing applicants for marketing positions

Buy Now
Question # 43

Which risk management strategy will help prevent cheating using a learning management system as a platform?

Options:

A.

Enforcement of a strict firewall policy to restrict access to the system's server

B.

Configuration of the system to disable all Bluetooth services on all workstations

C.

Implementation of secure user authentication protocols

D.

Implementation of regular software updates and patch management

Buy Now
Exam Name: WGU Cybersecurity Architecture and Engineering (KFO1/D488)
Last Update: Jun 15, 2025
Questions: 232
Cybersecurity-Architecture-and-Engineering pdf

Cybersecurity-Architecture-and-Engineering PDF

$29.75  $84.99
Cybersecurity-Architecture-and-Engineering Engine

Cybersecurity-Architecture-and-Engineering Testing Engine

$33.25  $94.99
Cybersecurity-Architecture-and-Engineering PDF + Engine

Cybersecurity-Architecture-and-Engineering PDF + Testing Engine

$47.25  $134.99