Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

Cybersecurity-Architecture-and-Engineering Exam Dumps - WGU Courses and Certificates Questions and Answers

Question # 64

Which data type should be used to calculate 90% of the retail price of an item?

Options:

A.

Floating-point

B.

String

C.

Boolean

D.

Auto-number

Buy Now
Question # 65

A cybersecurity analyst at a manufacturing company is tasked with analyzing the indicators of compromise (IOCs) to identify potential threats and vulnerabilities within the organization. While viewing the security information and event management (SIEM), the analyst notices an unknown IP address logging on to the company's Secure Shell (SSH) server.

Which potential vulnerability is the manufacturing company facing?

Options:

A.

Exfiltration

B.

Unpatched software

C.

Enumeration

D.

Weak passwords

Buy Now
Question # 66

The DevSecOps team for an organization manages a continuous integration and continuous deployment (CI/CD) pipeline for a three-tier web application. Management has asked the team to perform a series of comprehensive post-deployment tests to make sure that all of the components of the application can interact and function properly.

Options:

A.

Dynamic code analysis

B.

Integration testing

C.

Static code analysis

D.

Package scanning

Buy Now
Question # 67

What type of software utilizes a commercial software license?

Options:

A.

Public Domain

B.

Proprietary

C.

Open Source

D.

Shareware

Buy Now
Question # 68

Which stream cipher is a variant of the Salsa20 cipher, designed to be fast, secure, and resistant to cryptanalysis, and is commonly used in combination with the Poly1305 authentication mode?

Options:

A.

ChaCha

B.

Cipher Block Chaining (CBC)

C.

Counter (CTR)

D.

Electronic Codebook (ECB)

Buy Now
Question # 69

A large technology company has discovered a known vulnerability in its network infrastructure.The infrastructure contains a number of retired assets that are no longer receiving security updates, which could potentially be exploited by attackers to compromise the network. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

Options:

A.

Conducting regular vulnerability scans to identify potential weaknesses

B.

Implementing intrusion detection and prevention systems (IDPS)

C.

Enforcing strict access control policies for all network devices

D.

Removing all end-of-life devices from the network

Buy Now
Question # 70

An IT organization has recently suffered multiple data breaches. The security operations center (SOC) team has been tasked with preventing future breaches by implementing user monitoring. The proposed solution must provide insights about unusual user behaviors from a variety of internal corporate resources.

Which solution meets the requirements?

Options:

A.

Virtual private network (VPN)

B.

Secure Shell (SSH) Protocol

C.

Web application firewall (WAF)

D.

Security information and event management (SIEM)

Buy Now
Question # 71

A company has recently failed a security audit. Many of the end users have passwords older than 365 days.

Which password policy type will prevent this issue?

Options:

A.

Expiration

B.

Length

C.

Recovery

D.

Complexity

Buy Now
Question # 72

A cybersecurity analyst at a healthcare organization was tasked with analyzing the indicators of compromise (IOCs) to identify potential threats and vulnerabilities within the enterprise. Theanalyst notices unknown users logging on to the company's wireless local-area network (WLAN).

What is a potential vulnerability the healthcare organization is facing based on the IOCs identified?

Options:

A.

Unsecured wireless access points

B.

Up-to-date anti-malware software

C.

A strong password policy

D.

Regular security awareness training for employees

Buy Now
Exam Name: WGU Cybersecurity Architecture and Engineering (KFO1/D488)
Last Update: Jun 15, 2025
Questions: 232
Cybersecurity-Architecture-and-Engineering pdf

Cybersecurity-Architecture-and-Engineering PDF

$29.75  $84.99
Cybersecurity-Architecture-and-Engineering Engine

Cybersecurity-Architecture-and-Engineering Testing Engine

$33.25  $94.99
Cybersecurity-Architecture-and-Engineering PDF + Engine

Cybersecurity-Architecture-and-Engineering PDF + Testing Engine

$47.25  $134.99