Cybersecurity Architecture and Engineering Online Practice Questions

Home / WGU / Cybersecurity Architecture and Engineering

Latest Cybersecurity Architecture and Engineering Exam Practice Questions

The practice questions for Cybersecurity Architecture and Engineering exam was last updated on 2025-11-20 .

Viewing page 1 out of 16 pages.

Viewing questions 1 out of 82 questions.

Question#1

An IT organization has seen a surge of ransomware and Trojan horse attacks recently.
Which action should the security team recommend to protect the IT infrastructure from commodity malware threats?

A. Installing a firewall to identify malicious traffic
B. Rerouting suspicious communications to a remote machine
C. Implementing a two-factor authentication system
D. Installing endpoint protection software

Explanation:
The correct answer is D ― Installing endpoint protection software.
WGU Cybersecurity Architecture and Engineering (KFO1 / D488) teaches that endpoint protection (including antivirus, anti-malware, and endpoint detection and response) is critical for detecting, blocking, and removing commodity malware like ransomware and Trojans.
Firewalls (A) help with perimeter security but don't directly block malware on endpoints. Rerouting communications (B) is not a standard protection method. Two-factor authentication (C) secures logins but does not protect systems from malware infection.
Reference Extract from Study Guide:
"Endpoint protection software defends individual systems against malware threats by detecting, blocking, and removing malicious files and processes."
― WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Endpoint Security Solutions

Question#2

An organization wants to secure remote access to its servers and is looking for a secure protocol that can provide encryption and strong authentication. The organization wants to ensure that its servers can only be accessed by authorized users and that the data exchanged during the session is encrypted.
Which protocol meets the needs of the organization?

A. Hypertext Transfer Protocol (HTTP)
B. File Transfer Protocol (FTP)
C. Telnet
D. Secure Shell (SSH)

Explanation:
The correct answer is D ― Secure Shell (SSH).
WGU Cybersecurity Architecture and Engineering (KFO1 / D488) materials state that SSH provides strong encryption and authentication for remote access over unsecured networks. SSH ensures that sessions are confidential and that only authorized users can access remote systems.
HTTP (A) and FTP (B) transmit data in plaintext and do not provide encryption. Telnet (C) also transmits data in plaintext and is insecure for remote access.
Reference Extract from Study Guide:
"Secure Shell (SSH) is used for secure remote management, offering encrypted communications and authentication mechanisms to protect against unauthorized access and eavesdropping."
― WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Secure Protocols and Communications

Question#3

Which type of systems testing includes having end users test the system with simulated data and the help of the developer?

A. User Acceptance
B. Beta
C. Alpha
D. Analysis

Explanation:
Alpha testing is a type of system testing that involves having end users test the system with simulated data and the help of the developer. This phase is crucial because:
Early feedback: Users provide early feedback on the usability and functionality of the system.
Bug identification: Developers can identify and fix bugs before the system is released for beta testing or production.
Simulated environment: The testing is done in a controlled, simulated environment, often within the development organization.
Alpha testing is followed by beta testing, where the system is tested in a real-world environment by end users without the developers' direct involvement.
Reference
Ron Patton, "Software Testing, " Sams Publishing.
Glenford J. Myers, "The Art of Software Testing, " Wiley.

Question#4

A company has discovered a vulnerability in its Domain Name System (DNS) that could allow attackers to redirect users to malicious websites. The company has decided to implement a risk management strategy to mitigate this vulnerability.
What is the most effective risk management strategy for this vulnerability?

A. Increasing the frequency of DNS server patching
B. Conducting regular security awareness training for employees on the risks of phishing attacks
C. Implementing Domain Name System Security Extensions (DNSSEC) to digitally sign DNS responses and prevent DNS spoofing attacks
D. Restricting DNS access to trusted Internet Protocol (IP) addresses only

Explanation:
DNSSEC (Domain Name System Security Extensions) is a security protocol that adds cryptographic validation to DNS responses, making it nearly impossible for attackers to spoof DNS responses or redirect users to malicious sites.
NIST SP 800-81 Rev. 2 (Secure Domain Name System (DNS) Deployment Guide):
“DNSSEC provides data origin authentication and data integrity to DNS responses using digital signatures, effectively mitigating spoofing and cache poisoning attacks.”
While patching and awareness are important, DNSSEC directly mitigates the technical risk described.
WGU Course Alignment:
Domain: System Security Engineering
Topic: Implement DNS hardening techniques such as DNSSEC

Question#5

A large corporation is considering expanding its operations into a new geographic region. The corporation is concerned about the potential dangers associated with this expansion.
What is the most important factor to consider when evaluating the potential risks in this scenario?

A. Impact of attack
B. Inherent risk
C. Threat of attack
D. Likelihood of attack

Explanation:
The correct answer is B ― Inherent risk.
WGU Cybersecurity Architecture and Engineering (KFO1 / D488) defines inherent risk as the level of risk that exists before any controls or mitigation strategies are implemented. When evaluating expansion into new regions, the corporation must first understand the baseline level of risk (political, regulatory, cyber threats, etc.) inherent to the new environment.
Impact (A) refers to consequences but doesn't capture the natural risk level. Threat of attack (C) and likelihood (D) are specific aspects, but inherent risk (B) provides a comprehensive starting point for evaluating all potential dangers.
Reference Extract from Study Guide:
"Inherent risk is the natural level of risk present in a business activity or environment before applying controls, critical for evaluating new ventures or expansions."
― WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Enterprise Risk Management

Exam Code: Cybersecurity Architecture and EngineeringQ & A: 232 Q&AsUpdated:  2025-11-20

 Get All Cybersecurity Architecture and Engineering Q&As