Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

Cybersecurity-Architecture-and-Engineering Exam Dumps - WGU Courses and Certificates Questions and Answers

Question # 44

A financial institution conducted a cybersecurity assessment, which identified several vulnerabilities including outdated software and weak password policies. The company also needs to implement a new core banking system that can handle a large number of transactions while ensuring the security of customer data.

Which risk mitigation process is the most effective approach to address these vulnerabilities, and what is the best topology for the new core banking system?

Options:

A.

Implementing security patches and updates on a regular basis and using hybrid cloud topology

B.

Installing antivirus software on all endpoints and using on-premises topology

C.

Creating strong password policies and enforcing multifactor authentication and using public cloud topology

D.

Conducting regular security audits and penetration testing and using private cloud topology

Buy Now
Question # 45

A company has identified a potential risk associated with a new software implementation, which could result in a significant data breach.

Which step of the risk management life cycle involves implementing security controls to prevent the risk?

Options:

A.

Assess

B.

Identify

C.

Control

D.

Review

Buy Now
Question # 46

A financial institution is planning to conduct a business impact analysis (BIA) to evaluate the criticality of its business processes and functions.

Which steps will allow the company to perform a BIA?

Options:

A.

Monitor network and system activity, detect security incidents, and respond quickly to minimize the impact on critical business processes

B.

Develop business continuity plans and procedures, establish a crisis management team, and test the plan regularly

C.

Determine business processes and recovery criticality, identify resource requirements, and identify recovery priorities for system resources

D.

Determine recovery time objectives and recovery point objectives, develop recovery strategies, and document the recovery plan

Buy Now
Question # 47

A consultancy organization has many employees who travel with different mobile devices. Having the employees visit an office to update their devices is not feasible due to their travel schedule.

How should the organization ensure that its employees receive the latest security updates?

Options:

A.

By providing remote module updates

B.

By providing tokenized container updates

C.

By providing mobile station updates

D.

By providing over-the-air updates

Buy Now
Question # 48

Which block cipher mode of operation for encrypting data is simple and efficient but provides no confidentiality beyond that of the underlying block cipher?

Options:

A.

Counter (CTR)

B.

Electronic Codebook (ECB)

C.

Output Feedback (OFB)

D.

Cipher Block Chaining (CBC)

Buy Now
Question # 49

An organization is experiencing multiple instances of attempted access from geographicallocations where there are no corporate offices or staff.

What should a network administrator do to prevent further access attempts?

Options:

A.

Adjust the rule sets within the Security Information and Event Manager (SIEM) tool

B.

Adjust the Domain Name Service (DNS) server A Records

C.

Adjust the main proxy server to only allow specific addresses

D.

Adjust the firewall configuration to drop traffic from these addresses

Buy Now
Question # 50

Which type of services are Google Apps, Dropbox. and GoToMeeling?

Options:

A.

Infrastructure-as-a-Service (laaS)

B.

Security-as-a-Service (SECaaS)

C.

Platform-as-a-Service (PaaS)

D.

Software-as-a-Service (SaaS)

Buy Now
Question # 51

When is it better to purchase software rather than build a software solution in-house?

Options:

A.

When the company has very specific needs

B.

When the company wants internal growth

C.

When there is a short timeline

D.

When the company wants to develop the skill sets of its internal IT staff

Buy Now
Question # 52

An IT organization has recently implemented a hybrid cloud deployment. The server team is deploying a new set of domain-joined Windows servers on cloud-based virtual machines. Users must be able to use their Active Directory credentials to sign in to applications regardless of whether they are running on Windows servers in the cloud or on-premises.

Which solution should be implemented to meet the requirements?

Options:

A.

Two-step verification

B.

Challenge-Handshake Authentication Protocol (CHAP)

C.

Privileged identity management

D.

Identity federation

Buy Now
Question # 53

A retail company has recently implemented a new point of sale (POS) system that is critical to its business.

Which security control is essential for protecting the availability of the POS system?

Options:

A.

Backing up the data stored in the POS system and having a disaster recovery plan

B.

Regularly updating the POS system with the latest security patches

C.

Implementing intrusion detection and prevention systems

D.

Enforcing strict access controls on the POS system

Buy Now
Exam Name: WGU Cybersecurity Architecture and Engineering (KFO1/D488)
Last Update: Jun 15, 2025
Questions: 232
Cybersecurity-Architecture-and-Engineering pdf

Cybersecurity-Architecture-and-Engineering PDF

$29.75  $84.99
Cybersecurity-Architecture-and-Engineering Engine

Cybersecurity-Architecture-and-Engineering Testing Engine

$33.25  $94.99
Cybersecurity-Architecture-and-Engineering PDF + Engine

Cybersecurity-Architecture-and-Engineering PDF + Testing Engine

$47.25  $134.99