WGU Cybersecurity-Architecture-and-Engineering Exam (page: 2)
WGU Cybersecurity Architecture and Engineering (KFO1/D488)
Updated on: 07-Feb-2026

What are two differences between a handheld computer and a desktop?

Choose 2 answers.

  1. A handheld has more memory.
  2. A desktop has more memory.
  3. A desktop has more internal storage.
  4. A handheld has more internal storage.

Answer(s): B,C

Explanation:

Desktops typically have more memory (RAM) and internal storage (hard drives or SSDs) compared to handheld computers. This allows desktops to handle more intensive computingtasks and store larger amounts of data. Handheld devices, on the other hand, prioritize portability and battery life over high storage and memory capacity.



Which software allows the user to easily access the hardware of a computer?

  1. Productivity
  2. FTP client
  3. Application
  4. Operating system

Answer(s): D

Explanation:

The operating system (OS) is the primary software that manages all the hardware and other software on a computer. It acts as an intermediary between users and the computer hardware. The OS handles basic tasks such as controlling and allocating memory, prioritizing system requests, controlling input and output devices, facilitating networking, and managing files. Examples include Windows, macOS, and Linux.



Which peripheral replaces the mouse on a mobile device?

  1. Stylus
  2. Jack
  3. Camera
  4. USB

Answer(s): A



Which life cycle is part of the process for planning, creating, testing, and deploying information systems?

  1. Network Development Life Cycle (NDLC)
  2. System Development Life Cycle (SDLC)
  3. Database Creation System Life Cycle (DCSLC)
  4. Software Test Life Cycle (STLC)

Answer(s): B

Explanation:

The System Development Life Cycle (SDLC) is a process used for planning, creating, testing, and deploying an information system. It involves several stages, including requirements gathering, system design, implementation, testing, deployment, and maintenance. The SDLC ensures that the system meets the needs of users and is developed in a structuredand efficient manner.



In which state is data considered information?

  1. Raw
  2. Input
  3. Unprocessed
  4. Processed

Answer(s): D

Explanation:

Data is considered information when it has been processed and organized in a meaningful way. Raw data in its unprocessed state is not useful until it undergoes processing to become interpretable and actionable information. Processing can involve sorting, aggregating, and analyzing data to extract valuable insights.



An organization sends customers e-mail messages based on their purchase patterns.

Which characteristic of quality data does this represent?

  1. Relevant
  2. Timely
  3. Thorough
  4. Accurate

Answer(s): A

Explanation:

The characteristic of quality data represented here is relevance.
When an organization sends customers email messages based on their purchase patterns, it ensures that the information is relevant to the customers' interests and needs. Relevant data is tailored to the specific context in which it is used, enhancing its value and effectiveness.



Which two benefits do computer networks provide for businesses?

Choose 2 answers

  1. Lower IT operations costs
  2. Improved information security
  3. Increased Internet communications speed
  4. Organization cost savings
  5. Increased business efficiency

Answer(s): A

Explanation:

Computer networks provide several benefits for businesses, including:

Lower IT operations costs: Networking allows businesses to share resources, such as printers and storage, reducing the need for individual equipment for each user and lowering overall IT costs.

Increased business efficiency: Networks enable faster communication and data sharing between employees, departments, and locations, leading to more efficient business operations and improved collaboration.



Which type of services are Google Apps, Dropbox. and GoToMeeling?

  1. Infrastructure-as-a-Service (laaS)
  2. Security-as-a-Service (SECaaS)
  3. Platform-as-a-Service (PaaS)
  4. Software-as-a-Service (SaaS)

Answer(s): D

Explanation:

Google Apps, Dropbox, and GoToMeeting are examples of Software-as-a-Service (SaaS). SaaS provides software applications over the internet as a service. Users can access the softwarethrough a web browser without needing to install and maintain the software on their local devices, making it convenient and cost-effective for both individuals and businesses.



Viewing Page 2 of 30



Share your comments for WGU Cybersecurity-Architecture-and-Engineering exam with other users:

Salesforce consultant 1/2/2024 1:32:00 PM

good questions for practice
FRANCE


Ridima 9/12/2023 4:18:00 AM

need dump and sap notes for c_s4cpr_2308 - sap certified application associate - sap s/4hana cloud, public edition - sourcing and procurement
Anonymous


Tanvi Rajput 10/6/2023 6:50:00 AM

question 11: d i personally feel some answers are wrong.
UNITED KINGDOM


Anil 7/18/2023 9:38:00 AM

nice questions
Anonymous


Chris 8/26/2023 1:10:00 AM

looking for c1000-158: ibm cloud technical advocate v4 questions
Anonymous


sachin 6/27/2023 1:22:00 PM

can you share the pdf
Anonymous


Blessious Phiri 8/13/2023 10:26:00 AM

admin ii is real technical stuff
Anonymous


Luis Manuel 7/13/2023 9:30:00 PM

could you post the link
UNITED STATES


vijendra 8/18/2023 7:54:00 AM

hello send me dumps
Anonymous


Simeneh 7/9/2023 8:46:00 AM

it is very nice
Anonymous


john 11/16/2023 5:13:00 PM

i gave the amazon dva-c02 tests today and passed. very helpful.
Anonymous


Tao 11/20/2023 8:53:00 AM

there is an incorrect word in the problem statement. for example, in question 1, there is the word "speci c". this is "specific. in the other question, there is the word "noti cation". this is "notification. these mistakes make this site difficult for me to use.
Anonymous


patricks 10/24/2023 6:02:00 AM

passed my az-120 certification exam today with 90% marks. studied using the dumps highly recommended to all.
Anonymous


Ananya 9/14/2023 5:17:00 AM

i need it, plz make it available
UNITED STATES


JM 12/19/2023 2:41:00 PM

q47: intrusion prevention system is the correct answer, not patch management. by definition, there are no patches available for a zero-day vulnerability. the way to prevent an attacker from exploiting a zero-day vulnerability is to use an ips.
UNITED STATES


Ronke 8/18/2023 10:39:00 AM

this is simple but tiugh as well
Anonymous


CesarPA 7/12/2023 10:36:00 PM

questão 4, segundo meu compilador local e o site https://www.jdoodle.com/online-java-compiler/, a resposta correta é "c" !
UNITED STATES


Jeya 9/13/2023 7:50:00 AM

its very useful
INDIA


Tracy 10/24/2023 6:28:00 AM

i mastered my skills and aced the comptia 220-1102 exam with a score of 920/1000. i give the credit to for my success.
Anonymous


James 8/17/2023 4:33:00 PM

real questions
UNITED STATES


Aderonke 10/23/2023 1:07:00 PM

very helpful assessments
UNITED KINGDOM


Simmi 8/24/2023 7:25:00 AM

hi there, i would like to get dumps for this exam
AUSTRALIA


johnson 10/24/2023 5:47:00 AM

i studied for the microsoft azure az-204 exam through it has 100% real questions available for practice along with various mock tests. i scored 900/1000.
GERMANY


Manas 9/9/2023 1:48:00 AM

please upload 1z0-1072-23 exam dups
UNITED STATES


SB 9/12/2023 5:15:00 AM

i was hoping if you could please share the pdf as i’m currently preparing to give the exam.
Anonymous


Jagjit 8/26/2023 5:01:00 PM

i am looking for oracle 1z0-116 exam
UNITED STATES


S Mallik 11/27/2023 12:32:00 AM

where we can get the answer to the questions
Anonymous


PiPi Li 12/12/2023 8:32:00 PM

nice questions
NETHERLANDS


Dan 8/10/2023 4:19:00 PM

question 129 is completely wrong.
UNITED STATES


gayathiri 7/6/2023 12:10:00 AM

i need dump
UNITED STATES


Deb 8/15/2023 8:28:00 PM

love the site.
UNITED STATES


Michelle 6/23/2023 4:08:00 AM

can you please upload it back?
Anonymous


Ajay 10/3/2023 12:17:00 PM

could you please re-upload this exam? thanks a lot!
Anonymous


him 9/30/2023 2:38:00 AM

great about shared quiz
Anonymous