Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

Cybersecurity-Architecture-and-Engineering Sample Questions Answers

Questions 4

A healthcare provider is required to comply with the Health Insurance Portability and Accountability Act (HIPAA), which sets requirements for the protection of patient healthinformation. The provider uses various software applications to manage and store patient health information, which must be coded to protect its confidentiality and integrity.

Which protocol will meet the needs of this provider?

Options:

A.

Wired Equivalent Privacy (WEP)

B.

Advanced Encryption Standard (AES)

C.

Simple Mail Transfer Protocol (SMTP)

D.

Rivest-Shamir-Adleman (RSA)

Buy Now
Questions 5

Which risk management strategy will ensure the secure configuration and deployment of a new supply chain management system and prevent identity theft?

Options:

A.

Use of a strict firewall policy to restrict access to the system’s server

B.

Configuration of the system to disable all universal serial bus (USB) ports on all workstations

C.

Implementation of regular vulnerability scans and patch management

D.

Implementation of multifactor authentication for all user accounts

Buy Now
Questions 6

Which risk management strategy will help defeat piracy efforts on a new patient management system?

Options:

A.

Configuration of the patient management system to disable all external device connections on all workstations

B.

Incorporation of end-to-end encryption for all patient data

C.

Implementation of regular virus scanning for all workstations

D.

Implementation of licensing technologies in order to restrict unauthorized access to the system

Buy Now
Questions 7

A company has recently experienced a data breach in which customer information was stolen. The company is concerned about the potential for future data breaches. A review of the incident revealed that the breach originated from stolen credentials.

Which security measure will meet the needs of this company?

Options:

A.

Implementing two-factor authentication

B.

Conducting background checks on employees

C.

Providing regular security awareness training to employees

D.

Installing a security information and event management (SIEM) system

Buy Now
Questions 8

A company has discovered a vulnerability in its Domain Name System (DNS) that could allow attackers to redirect users to malicious websites. The company has decided to implement a risk management strategy to mitigate this vulnerability.

What is the most effective risk management strategy for this vulnerability?

Options:

A.

Increasing the frequency of DNS server patching

B.

Conducting regular security awareness training for employees on the risks of phishing attacks

C.

Implementing Domain Name System Security Extensions (DNSSEC) to digitally sign DNS responses and prevent DNS spoofing attacks

D.

Restricting DNS access to trusted Internet Protocol (IP) addresses only

Buy Now
Questions 9

A software development company has experienced a noticeable slowdown in its network performance, which suggests that some machines on the network may have been infected by a botnet. The company has decided to analyze the threats and vulnerabilities within the enterprise based on the indicators of compromise to mitigate the risk.

What should the company do to detect a botnet and other malware-based threats within the enterprise based on the indicators of compromise?

Options:

A.

Use two-factor authentication for external users

B.

Define strict firewall rules

C.

Constantly scan for known signatures on every machine

D.

Implement a configuration management solution

Buy Now
Questions 10

A company with a hybrid cloud deployment needs to identify all possible threat types that could impact production systems.

Which threat hunting technique should be used to identify potential attacks that have already occurred?

Options:

A.

Honeypots

B.

Log analysis

C.

Social engineering

D.

Penetration testing

Buy Now
Questions 11

A healthcare provider is developing a disaster recovery plan and wants to determine the longest duration that its systems or applications can be down before causing significant damage to the business.

What is the term used to describe this metric?

Options:

A.

Recovery time objective (RTO)

B.

Business impact analysis (BIA)

C.

Business continuity planning (BCP)

D.

Disaster recovery (DR)

Buy Now
Questions 12

An IT organization has recently implemented a hybrid cloud deployment. The server team is deploying a new set of domain-joined Windows servers on cloud-based virtual machines. Users must be able to use their Active Directory credentials to sign in to applications regardless of whether they are running on Windows servers in the cloud or on-premises.

Options:

A.

Identity federation

B.

Privileged identity management

C.

Challenge-Handshake Authentication Protocol (CHAP)

D.

Two-step verification

Buy Now
Questions 13

A security team has been informed that user data on the network has been compromised.

What is the first step the organization should take to respond to this data breach?

Options:

A.

Notify affected users of the incident

B.

Implement an access control policy

C.

Increase encryption levels

D.

Publicly announce the breach

Buy Now
Questions 14

What is an information system?

Options:

A.

The hardware that allows human-computer interactions

B.

A database utility from a third party

C.

The computer hardware components

D.

A collection of data to support an organization

Buy Now
Questions 15

During a vulnerability assessment, several end-of-life operating systems were discovered within the environment. Which action should be taken to resolve the issue?

Options:

A.

Disconnect the end-of-life machines

B.

Shutdown and remove the end-of-life machines

C.

Block the end-of-life machines

D.

Upgrade the remaining end-of-life machines

Buy Now
Questions 16

Which risk management strategy will help prevent cheating using a learning management system as a platform?

Options:

A.

Implementation of secure user authentication protocols

B.

Implementation of regular software updates and patch management

C.

Enforcement of a strict firewall policy to restrict access to the system’s server

D.

Configuration of the system to disable all Bluetooth services on all workstations

Buy Now
Questions 17

When is it better to purchase software rather than build a software solution in-house?

Options:

A.

When the company has very specific needs

B.

When the company wants internal growth

C.

When there is a short timeline

D.

When the company wants to develop the skill sets of its internal IT staff

Buy Now
Questions 18

What is true about an operating system?

Options:

A.

It is a firmware burned onto the computer mother board.

B.

It is a software program that directly supports the computer itself.

C.

It is a hardware component of the computer system.

D.

It is an application program similar to word processors.

Buy Now
Questions 19

What are three operating systems that are commonly used today?

Choose 3 answers

Options:

A.

Microsoft Outlook

B.

Mac OS

C.

Linux

D.

MySQL

E.

Microsoft Windows

F.

Mozilla Firefox

Buy Now
Questions 20

A company is developing a new system to process personal information about its customers, including their names, addresses, and purchase histories.

Which term describes the process of identifying and evaluating the potential effects that the new system may have on the privacy of personal information and developing strategies to mitigate those risks?

Options:

A.

Data Protection Impact Assessment (DPIA)

B.

Business Continuity Planning (BCP)

C.

Risk Management

D.

Disaster Recovery (DR)

Buy Now
Questions 21

A company has discovered a vulnerability in its domain name system (DNS) that could allow attackers to redirect users to malicious websites. The company has decided to implement a risk management strategy to mitigate this vulnerability.

What is the most effective risk management strategy for this vulnerability?

Options:

A.

Restricting DNS access to trusted internet protocol (IP) addresses only

B.

Implementing domain name system security extensions (DNSSEC) to digitally sign DNS responses and prevent DNS spoofing attacks

C.

Increasing the frequency of DNS server patching

D.

Conducting regular security awareness training for employees on the risks of phishing attacks

Buy Now
Questions 22

What type of software utilizes a commercial software license?

Options:

A.

Public Domain

B.

Proprietary

C.

Open Source

D.

Shareware

Buy Now
Questions 23

What does the following SQL statement produce when executed?

SELECT ‘ FROM Customers

WHERE State = ’Arizona';

Options:

A.

All of the records from the Customers table

B.

All of the records from the Customers database

C.

All of the records from the Customers database that are located in Arizona

D.

All of the records from the Customers table that are located in Arizona

Buy Now
Questions 24

A security team is investigating multiple man-in-the-middle attacks that have taken place on the corporate network over the past few months. The team needs a solution that will ensure that data is not exposed if a man-in-the-middle attack occurs in the future.

What is the best solution?

Options:

A.

Disabling Wi-Fi connections

B.

Enforcing password history

C.

Encrypting data

D.

Ensuring all users have complex passwords

Buy Now
Questions 25

Which two languages are scripted?

Choose 2 answers

Options:

A.

Python

B.

Ada

C.

PHP

D.

C

Buy Now
Questions 26

What is a function of a compiler?

Options:

A.

It translates a source code and creates an executable program that may be run at a later time.

B.

It takes the most recent instruction and translates it as machine language.

C.

It takes a program written in a high-level language and converts it to a different high-level language program.

D.

It gathers together multiple executable programs and translates them into a readable format.

Buy Now
Questions 27

Which statement best describes the purpose of a business intelligence (Bl) system?

Options:

A.

A Bl system allows access to raw data.

B.

A Bl system uses only proprietary data to maximize quality.

C.

A Bl system integrates all departments in an organization.

D.

A Bl system helps the strategic decision-making process.

Buy Now
Questions 28

Which IT role is responsible for installing new hardware and troubleshooting existing hardware?

Options:

A.

Web administrator

B.

System administrator

C.

Security administrator

D.

Network administrator

Buy Now
Questions 29

The security team has been notified about multiple man-in-the-middle (MITM) attacks happening on the wireless network over the past thirty days. Management has agreed to upgrade the network infrastructure to help eliminate these attacks.

Which solution fulfills these requirements?

Options:

A.

Security information and event management (SIEM)

B.

Wireless intrusion prevention system (WIPS)

C.

Inline network encryptor

D.

Layer 3 switch

Buy Now
Questions 30

A company is preparing to test its disaster recovery plan, which includes procedures for restoringcritical systems in the event of a disruption. The company wants to conduct a test that is as close to a real disaster as possible without actually disrupting business operations.

Which disaster recovery test will meet the needs of the company?

Options:

A.

Walk-through test

B.

Parallel simulation test

C.

Full interruption test

D.

Tabletop exercise

Buy Now
Questions 31

A retail company has recently implemented a new point of sale (POS) system that is critical to its business.

Which security control is essential for protecting the availability of the POS system?

Options:

A.

Implementing intrusion detection and prevention systems can help detect and prevent unauthorized access to the POS system.

B.

Regularly backing up the data stored in the POS system and having a disaster recovery plan can help ensure that the system is available in the event of a security incident or system failure.

C.

Enforcing strict access controls can limit the number of users with access to the POS system and prevent unauthorized access.

D.

Regularly updating the POS system with the latest security patches can help prevent exploitation of known vulnerabilities and maintain the system's availability.

Buy Now
Questions 32

The security operations center (SOC) team has been alerted about malicious traffic on the corporate network and is concerned about a distributed denial of service (DDoS) attack. An analyst has been tasked with inspecting network traffic in the on-premises data center to investigate the issue.

Which type of file should the analyst use to inspect the traffic?

Options:

A.

Web server access log

B.

Syslog messages

C.

Operating system event log

D.

Packet capture

Buy Now
Questions 33

A government agency needs to deploy a secure network connection between its offices in Chicago and New York.

What should be used to facilitate this connection?

Options:

A.

Virtual private network (VPN)

B.

Security information and event management (SIEM)

C.

Point-to-Point Tunneling Protocol (PPTP)

D.

Network access control (NAC)

Buy Now
Questions 34

Which life cycle is part of the process for planning, creating, testing, and deploying information systems?

Options:

A.

Network Development Life Cycle (NDLC)

B.

System Development Life Cycle (SDLC)

C.

Database Creation System Life Cycle (DCSLC)

D.

Software Test Life Cycle (STLC)

Buy Now
Questions 35

What is the vocabulary and set of rules for instructing a computer to perform certain tasks?

Options:

A.

Low-level language

B.

Translator language

C.

Machine language

D.

Programming language

Buy Now
Questions 36

A medium-sized grocery chain with locations all across the United States has a new business requirement that all devices must authenticate to access its resources.

What should the grocery chain use for the devices to authenticate?

Options:

A.

Virtual private network (VPN)

B.

Public key infrastructure (PKI)

C.

Certificate signing

D.

Endpoint passwords

Buy Now
Questions 37

A company is concerned about the potential risks associated with unauthorized modifications to the Basic Input/Output System (BIOS) firmware on its servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which technique will prevent unauthorized modifications to the BIOS firmware on a server?

Options:

A.

Using an intrusion detection system to detect and prevent attacks

B.

BIOS protection

C.

BIOS monitoring

D.

Conducting regular backups of the server’s data

Buy Now
Questions 38

How should a security analyst detect a potential structured query language (SQL) injection attack?

Options:

A.

By looking for extra and unexpected symbols and characters in certain queries

B.

By looking for database primary key changes on the production environment

C.

By looking for repeated failed login attempts to the database server

D.

By looking for administrative command attempts within database log files

Buy Now
Questions 39

A cybersecurity analyst at a healthcare organization was tasked with analyzing the indicators of compromise (IOCs) to identify potential threats and vulnerabilities within the enterprise. Theanalyst notices unknown users logging on to the company's wireless local-area network (WLAN).

What is a potential vulnerability the healthcare organization is facing based on the IOCs identified?

Options:

A.

Unsecured wireless access points

B.

Up-to-date anti-malware software

C.

A strong password policy

D.

Regular security awareness training for employees

Buy Now
Questions 40

The security team has been notified about multiple man-in-the-middle (MITM) attacks happening on the wireless network over the past thirty days. Management has agreed to upgrade the network infrastructure to help eliminate these attacks.

Options:

A.

Security information and event management (SIEM)

B.

Inline network encryptor

C.

Layer 3 switch

D.

Wireless intrusion prevention system (WIPS)

Buy Now
Questions 41

A corporate website is currently being redesigned, which leaves it vulnerable to security threats. Management does not want to provide an attacker with any information about the web server.

Which strategy should be used to prevent an attacker from gaining unauthorized information?

Options:

A.

Enabling Hypertext Transfer Protocol Secure (HTTPS) over Domain Name Service (DNS)

B.

Using Hypertext Transfer Protocol Secure (HTTPS) for all page and content requests

C.

Obfuscating error messages on the site or within the uniform resource locator (URL)

D.

Becoming Payment Card Industry Data Security Standard (PCI-DSS) compliant and certified

Buy Now
Questions 42

Which algorithm is suitable for ensuring the integrity of digital documents and detecting any unauthorized modifications?

Options:

A.

Rivest–Shamir–Adleman (RSA)

B.

Data Encryption Standard (DES)

C.

Advanced Encryption Standard (AES)

D.

Secure Hash Algorithm 256 (SHA-256)

Buy Now
Questions 43

Which peripheral replaces the mouse on a mobile device?

Options:

A.

Stylus

B.

Jack

C.

Camera

D.

USB

Buy Now
Questions 44

Which risk management strategy will ensure that data stored on an Enterprise Resource Planning (ERP) system is secure from exploitation in the event of a data breach?

Options:

A.

Implementation of data encryption

B.

Enforcement of a strict firewall policy to restrict access to the ERP system’s server

C.

Implementation of regular backup and disaster recovery planning

D.

Configuration of the ERP system to disable all printing services on all workstations

Buy Now
Questions 45

During a vulnerability assessment, several end-of-life operating systems were discovered within the environment.

Which action should be taken to resolve the issue?

Options:

A.

Shut down and remove the end-of-life machines

B.

Disconnect the end-of-life machines

C.

Block the end-of-life machines

D.

Upgrade the remaining end-of-life machines

Buy Now
Questions 46

A corporate website is currently being redesigned, which leaves it vulnerable to security threats. Management does not want to provide an attacker with any information about the web server. Which strategy should be used to prevent an attacker from gaining unauthorized information?

Options:

A.

Obfuscating error messages on the site or within the Uniform Resource Locator (URL)

B.

Enabling Hypertext Transfer Protocol Secure (HTTPS) over Domain Name Service (DNS)

C.

Using HTTPS for all page and content requests

D.

Becoming PCI-DSS compliant and certified

Buy Now
Questions 47

A retail company wants to establish the frequency at which it needs to back up its critical data to ensure it can be restored in case of a disruption with the least amount of acceptable data loss.

What is the term used to describe this metric?

Options:

A.

Business Impact Analysis (BIA)

B.

Continuous Data Protection (CDP)

C.

Recovery Point Objective (RPO)

D.

Disaster Recovery (DR)

Buy Now
Questions 48

An insurance agency is concerned that some employees could be mishandling funds and covering it up. The agency wants to temporarily block these employees from working and ensure that operations continue.

Which strategy should the agency implement?

Options:

A.

Separation of duties

B.

Mandatory vacation

C.

Job rotation

D.

Least privilege

Buy Now
Questions 49

An engineer has noticed increased network traffic originating from an unknown IP address. Which action should be taken to analyze the unusual network traffic patterns?

Options:

A.

Compare the unknown address to known IP addresses to determine if it is a threat

B.

Temporarily block all incoming traffic from the unknown IP address

C.

Permanently block all incoming traffic from the unknown IP address

D.

Rate limit incoming traffic from the unknown IP address

Buy Now
Questions 50

Which item information should be stored in a database to determine an order total?

Options:

A.

Item order line

B.

Item unit price

C.

Item description

D.

Item restock levels

Buy Now
Questions 51

Which risk management strategy will help prevent cheating using a learning management system as a platform?

Options:

A.

Enforcement of a strict firewall policy to restrict access to the system's server

B.

Configuration of the system to disable all Bluetooth services on all workstations

C.

Implementation of secure user authentication protocols

D.

Implementation of regular software updates and patch management

Buy Now
Questions 52

A company is moving its applications to the cloud and is concerned about cyber security threats. The security team has been tasked with providing a comprehensive view of how attackers gainaccess, move through networks, and carry out attacks.

Which framework identifies the seven phases of an attack, from initial infiltration to post-exploitation?

Options:

A.

Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) for industrial control systems (ICS)

B.

MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK)

C.

Cyber kill chain

D.

Diamond Model of Intrusion Analysis

Buy Now
Questions 53

What is the role of the CPU in a computing environment?

Choose 2 answers

Options:

A.

Carrying out the instructions of a computer program

B.

Storing data as it is being processed

C.

Directing electrical current over the circuit board

D.

Connecting components to the system unit

E.

Containing an arithmetic logic unit (ALU) that performs arithmetic and logic operations

Buy Now
Questions 54

An engineer has noticed increased network traffic originating from an unknown internet protocol (IP) address.

Which action should be taken to analyze the unusual network traffic patterns?

Options:

A.

Permanently block all incoming traffic from the unknown IP address

B.

Compare the unknown address to known IP addresses to determine if it is a threat

C.

Temporarily block all incoming traffic from the unknown IP address

D.

Rate limit incoming traffic from the unknown IP address

Buy Now
Questions 55

A software development company is concerned about the potential risks associated with exploits that target vulnerabilities in the Linux operating system used by the company's servers. The company has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

Options:

A.

Implementing a host-based intrusion detection and prevention system

B.

Enforcing strict access control policies for all users

C.

Implementing shell restrictions

D.

Conducting regular security assessments and penetration testing

Buy Now
Questions 56

How do data support an organization's business goals?

Options:

A.

Data create opportunities to compete for potential customers.

B.

Data can be manipulated to support desired outcomes.

C.

Data provide information for business decisions.

D.

Data ensure an organization's business goals are met.

Buy Now
Questions 57

Which characteristic applies to machine-level languages?

Options:

A.

They use language translators known as compilers

B.

They use cables to connect circuits

C.

They use collection of short scripts

D.

They use language translators known as assemblers

Buy Now
Questions 58

Which security technique should be used to prevent data exfiltration?

Options:

A.

Multi-factor authentication (MFA)

B.

Intrusion detection software (IDS)

C.

Data loss prevention (DLP)

D.

Intrusion prevention software (IPS)

Buy Now
Questions 59

What is the purpose of the feature that allows only one user to modify a document at a time in collaboration software?

Options:

A.

Data availability

B.

Data integrity

C.

Data confidentiality

D.

Data accessibility

Buy Now
Questions 60

Which item is an input device?

Options:

A.

Printer

B.

Flash Drive

C.

CD

D.

Scanner

Buy Now
Questions 61

Which block cipher mode of operation for encrypting data is simple and efficient and provides no confidentiality beyond that of the underlying block cipher?

Options:

A.

Electronic codebook (ECB)

B.

Cipher block chaining (CBC)

C.

Counter (CTR)

D.

Output feedback (OFB)

Buy Now
Questions 62

Which database has multiple tables with interrelated fields?

Options:

A.

Interrelated

B.

Hierarchical

C.

Flat file

D.

Relational

Buy Now
Questions 63

A healthcare provider is required to comply with the Health Insurance Portability and Accountability Act (HIPAA), which sets requirements for the protection of patient health information. The provider uses various software applications to manage and store patient health information, which must be coded to protect its confidentiality and integrity.

Which protocol will meet the needs of this provider?

Options:

A.

Wired Equivalent Privacy (WEP)

B.

Simple Mail Transfer Protocol (SMTP)

C.

Rivest–Shamir–Adleman (RSA)

D.

Advanced Encryption Standard (AES)

Buy Now
Questions 64

A software development company uses file transfer protocol (FTP) to transfer software code between different teams.

Which security control is essential for protecting the integrity of software code that is transferred using FTP?

Options:

A.

Calculating and comparing the hash values of the software code before and after transfer using FTP can help detect any changes and ensure the integrity of the code.

B.

Implementing intrusion detection and prevention systems can help detect and prevent unauthorized access to the FTP server and software code.

C.

Enforcing strict access controls can limit the number of users with access to the FTP server and prevent unauthorized access.

D.

Regularly backing up the software code stored in the FTP server and having a disaster recovery plan can help ensure the integrity of the software code.

Buy Now
Questions 65

A software development company is concerned about the potential risks associated with exploits that target vulnerabilities in the Linux operating system used by the company’s servers. Thecompany has decided to implement hardening techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of this company?

Options:

A.

Enforcing strict access control policies for all users

B.

Implementing a host-based intrusion detection and prevention system

C.

Conducting regular security assessments and penetration testing

D.

Implementing shell restrictions

Buy Now
Questions 66

An IT team must allow on-premises users to log in to the Azure portal using their corporate credentials.

Which strategy should be used to enable identity federation in this scenario?

Options:

A.

Encrypting with Transport Layer Security (TLS)

B.

Deploying a hardware-based two-factor authentication (2FA) solution

C.

Integrating with lightweight directory access protocol (LDAP)

D.

Configuring third-party authentication with Security Assertion Markup Language (SAML)

Buy Now
Questions 67

An IT team has been tasked with improving the security of a company’s web applications.

Which threats should the IT team consider detecting when defending the network with a web application firewall (WAF)?

Options:

A.

Phishing attacks

B.

Brute force attacks

C.

Structured Query Language (SQL) injection attacks

D.

Social engineering attacks

Buy Now
Questions 68

Which software allows the user to easily access the hardware of a computer?

Options:

A.

Productivity

B.

FTP client

C.

Application

D.

Operating system

Buy Now
Questions 69

Which security technique should be used to prevent data exfiltration?

Options:

A.

Intrusion Detection Software (IDS)

B.

Data Loss Prevention (DLP)

C.

Multi-Factor Authentication (MFA)

D.

Intrusion Prevention Software (IPS)

Buy Now
Exam Code: Cybersecurity-Architecture-and-Engineering
Exam Name: WGU Cybersecurity Architecture and Engineering (KFO1/D488)
Last Update: Jun 30, 2025
Questions: 232
$66  $164.99
$50  $124.99
$42  $104.99
buy now Cybersecurity-Architecture-and-Engineering