Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 7
Total 69 questions
Exam Code: Cybersecurity-Architecture-and-Engineering                Update: Oct 16, 2025
Exam Name: WGU Cybersecurity Architecture and Engineering (KFO1/D488)

WGU WGU Cybersecurity Architecture and Engineering (KFO1/D488) Cybersecurity-Architecture-and-Engineering Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

An engineer has noticed increased network traffic originating from an unknown IP address. Which action should be taken to analyze the unusual network traffic patterns?

A.

Compare the unknown address to known IP addresses to determine if it is a threat

B.

Temporarily block all incoming traffic from the unknown IP address

C.

Permanently block all incoming traffic from the unknown IP address

D.

Rate limit incoming traffic from the unknown IP address

Question # 2

Which risk management strategy will ensure the secure configuration and deployment of a new supply chain management system and prevent identity theft?

A.

Use of a strict firewall policy to restrict access to the system’s server

B.

Configuration of the system to disable all universal serial bus (USB) ports on all workstations

C.

Implementation of regular vulnerability scans and patch management

D.

Implementation of multifactor authentication for all user accounts

Question # 3

What are two differences between a handheld computer and a desktop?

Choose 2 answers.

A.

A handheld has more memory.

B.

A desktop has more memory.

C.

A desktop has more internal storage.

D.

A handheld has more internal storage.

Question # 4

The security team has been notified about multiple man-in-the-middle (MITM) attacks happening on the wireless network over the past thirty days. Management has agreed to upgrade the network infrastructure to help eliminate these attacks.

Which solution fulfills these requirements?

A.

Security information and event management (SIEM)

B.

Wireless intrusion prevention system (WIPS)

C.

Inline network encryptor

D.

Layer 3 switch

Question # 5

The security team manages a set of legacy firewalls that have been in production for nearly tenyears. The organization recently issued a mandate requiring that all firewalls be configured with intrusion detection controls that alert the team in real time based on known threats.

A.

Replacing the legacy firewalls with a security information and event management (SIEM) appliance

B.

Replacing the legacy firewalls with a reverse proxy

C.

Replacing the legacy firewalls with a load balancer

D.

Replacing the legacy firewalls with next-generation firewalls (NGFWs)

Question # 6

A company is looking to monitor and detect any suspicious activity on its servers. The company wants to implement a security solution that can detect any unauthorized access or unusual activity on the servers.

Which security technology will meet the needs of this company?

A.

Hardware security module (HSM)

B.

Two-factor authentication

C.

Antivirus tools

D.

Host-based intrusion detection system (HIDS)

Question # 7

An IT team must allow on-premises users to log in to the Azure portal using their corporate credentials.

Which strategy should be used to enable identity federation in this scenario?

A.

Encrypting with Transport Layer Security (TLS)

B.

Deploying a hardware-based two-factor authentication (2FA) solution

C.

Integrating with lightweight directory access protocol (LDAP)

D.

Configuring third-party authentication with Security Assertion Markup Language (SAML)

Question # 8

A large healthcare provider is acquiring a small clinic and has identified a full understanding of the clinic's organizational risks. The large provider has several tools it can implement to reduce the clinic's identified risks.

Which type of risk response should the healthcare provider use?

A.

Risk acceptance

B.

Risk mitigation

C.

Risk transference

D.

Risk avoidance

Question # 9

Why should an information technology (IT) professional be aware of professional associations?

A.

Professional associations provide up-to-date training.

B.

Professional associations will ensure higher quality work.

C.

Professional associations upgrade the company's network.

D.

Professional associations give feedback to management.

Question # 10

What type of a system requirement involves preventing unauthorized access to data?

A.

Accessibility

B.

Design

C.

User needs

D.

Security

Page: 1 / 7
Total 69 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 16 Oct 2025