WGU Cybersecurity-Architecture-and-Engineering Exam (page: 5)
WGU Cybersecurity Architecture and Engineering (KFO1/D488)
Updated on: 09-Feb-2026

What is one purpose of an End User License Agreement?

  1. Allow customers to legally create and sell a new version of the software
  2. Allow customers to legally use the software
  3. Allow customers to legally modify and compile the source code
  4. Allow customers to legally distribute the application to other users

Answer(s): B

Explanation:

AnEnd User License Agreement (EULA)is a legal contract between the software manufacturer and the user.

The primary purpose of a EULA is togrant the user the right to use the software.

It outlines the terms and conditions under which the software can be used.

This can include restrictions on installation, distribution, and modification.

The EULA helps protect the intellectual property rights of the software creator.


Reference:

"Software Licensing Handbook" by Jeffrey I. Gordon.

"Intellectual Property and Open Source" by Van Lindberg.



What is a common characteristic of a proprietary software license?

  1. A business gains the right to modify the software's source code.
  2. A business gains the right to use the software.
  3. A business gains the right to own the software.
  4. A business gains the right to distribute the software freely.

Answer(s): B

Explanation:

Aproprietary software licensetypically grants a business or user theright to usethe software.

Unlike open-source licenses, proprietary licenses do not usually allow modification, redistribution, or reverse engineering.

The software remains the property of the company that created it, and the licensee is only granted specific, limited rights.

Examples:Many enterprise software applications come with proprietary licenses that specify the terms of use.


Reference:

"Open Source Licensing: Software Freedom and Intellectual Property Law" by Lawrence Rosen.

"Proprietary Software Licenses Explained" from Software Engineering Institute.



Which method is frequently used to protect software?

  1. Trademarks
  2. GNU General Public License
  3. Copyrights
  4. Fair use

Answer(s): C

Explanation:

Copyrightsare a common legal method used to protect software.

A copyright gives the creator of the software exclusive rights to use and distribute the software.

It protects against unauthorized copying, modification, and distribution of the software.

Software creators can enforce their copyrights to prevent others from infringing on their intellectual property.

Example:Copyright law is often invoked in cases of software piracy.


Reference:

"Copyright Law for the Internet and Information Technology" by Geraldine Collins.

"Understanding Copyright Law" by Marshall A. Leaffer.



What is the role of the CPU in a computing environment?

Choose 2 answers

  1. Carrying out the instructions of a computer program
  2. Storing data as it is being processed
  3. Directing electrical current over the circuit board
  4. Connecting components to the system unit
  5. Containing an arithmetic logic unit (ALU) that performs arithmetic and logic operations

Answer(s): A,E

Explanation:

TheCentral Processing Unit (CPU)is the primary component of a computer that performs most of the processing inside a computer.

Carrying out the instructions of a computer program: The CPU executes program instructions, which are the basic tasks that tell the computer what to do.

Containing an arithmetic logic unit (ALU): The ALU performs all arithmetic and logic operations, such as addition, subtraction, and comparison.

The CPU also manages data flow between the computer's other components.

It fetches instructions from memory, decodes them, and then executes them, which involves performing calculations and making decisions.


Reference:

"Computer Organization and Design: The Hardware/Software Interface" by David A. Patterson and John L. Hennessy.

"Modern Processor Design: Fundamentals of Superscalar Processors" by John Paul Shen and Mikko H.
Lipasti.



An employee needs to execute a program from the command line.

Which peripheral device should be used?

  1. Keyboard
  2. Hard drive
  3. Speaker
  4. Printer

Answer(s): A

Explanation:

The employee needs to execute a program from the command line, which requires inputting commands into the computer.

The primary device for inputting commands is the keyboard.

Other options like the hard drive, speaker, and printer are not used for inputting commands.

The hard drive is used for data storage.

The speaker outputs sound.

The printer outputs documents.

Therefore, the correct peripheral device for this task is the keyboard.


Reference:

"Computer Fundamentals" by Anita Goel, which discusses input devices and their uses.

"The Principles of Information Systems" by Ralph Stair and George Reynolds, which details peripheral devices and their functions.



Which motherboard component is used for short-term storage of data?

  1. Hard Drive
  2. BIOS
  3. Read Only Memory
  4. RAM

Answer(s): D

Explanation:

Short-term storage of data on a motherboard is managed by Random Access Memory (RAM).

RAM is volatile memory, meaning it temporarily stores data that is actively being used or processed by the CPU.

The other options:

The hard drive is used for long-term storage.

BIOS (Basic Input/Output System) is firmware for hardware initialization.

Read Only Memory (ROM) is used for permanent data storage that doesn't change.

Thus, RAM is the correct answer for short-term data storage.


Reference:

"Computer Organization and Architecture" by William Stallings, which covers the various types of memory.

"Operating System Concepts" by Abraham Silberschatz, Peter B. Galvin, and Greg Gagne, which explains memory management.



Which item is an input device?

  1. Printer
  2. Flash Drive
  3. CD
  4. Scanner

Answer(s): D

Explanation:

An input device is any hardware component that allows a user to enter data into a computer.

A scanner is an input device that converts physical documents into digital format.

The other options:

Printer is an output device.

Flash drive is a storage device.

CD can be both storage and media for input/output depending on the context but is not primarily used for direct data input.

Therefore, a scanner is the correct answer for an input device.


Reference:

"Introduction to Computer Science" by ITL Education Solutions Limited, which discusses input and output devices.

"Digital Fundamentals" by Thomas L. Floyd, which includes information on various peripherals.



In which type of network topology are the networked devices connected to a central device like a hub or switch?

  1. Star
  2. Bus
  3. Mesh
  4. Ring

Answer(s): A

Explanation:

In a star network topology, each network device is connected to a central device like a hub or a switch.

This central device acts as a repeater for data flow.

The other options:

Bus topology uses a single central cable.

Mesh topology involves each device being connected to every other device.

Ring topology connects devices in a circular fashion.

Therefore, the star topology correctly describes a network where devices connect to a central hub or switch.


Reference:

"Data and Computer Communications" by William Stallings, which explains different network topologies.

"Network+ Guide to Networks" by Jill West, Tamara Dean, and Jean Andrews, which covers network configurations.



Viewing Page 5 of 30



Share your comments for WGU Cybersecurity-Architecture-and-Engineering exam with other users:

Saeed 11/7/2023 3:14:00 AM

looks a good platform to prepare az-104
Anonymous


Matiullah 6/24/2023 7:37:00 AM

want to pass the exam
Anonymous


SN 9/5/2023 2:25:00 PM

good resource
UNITED STATES


Zoubeyr 9/8/2023 5:56:00 AM

question 11 : d
FRANCE


User 8/29/2023 3:24:00 AM

only the free dumps will be enough for pass, or have to purchase the premium one. please suggest.
Anonymous


CW 7/6/2023 7:37:00 PM

good questions. thanks.
Anonymous


Farooqi 11/21/2023 1:37:00 AM

good for practice.
INDIA


Isaac 10/28/2023 2:30:00 PM

great case study
UNITED STATES


Malviya 2/3/2023 9:10:00 AM

the questions in this exam dumps is valid. i passed my test last monday. i only whish they had their pricing in inr instead of usd. but it is still worth it.
INDIA


rsmyth 5/18/2023 12:44:00 PM

q40 the answer is not d, why are you giving incorrect answers? snapshot consolidation is used to merge the snapshot delta disk files to the vm base disk
IRELAND


Keny 6/23/2023 9:00:00 PM

thanks, very relevant
PERU


Muhammad Rawish Siddiqui 11/29/2023 12:14:00 PM

wrong answer. it is true not false.
SAUDI ARABIA


Josh 7/10/2023 1:54:00 PM

please i need the mo-100 questions
Anonymous


VINNY 6/2/2023 11:59:00 AM

very good use full
Anonymous


Andy 12/6/2023 5:56:00 AM

very valid questions
Anonymous


Mamo 8/12/2023 7:46:00 AM

will these question help me to clear pl-300 exam?
UNITED STATES


Marial Manyang 7/26/2023 10:13:00 AM

please provide me with these dumps questions. thanks
Anonymous


Amel Mhamdi 12/16/2022 10:10:00 AM

in the pdf downloaded is write google cloud database engineer i think that it isnt the correct exam
FRANCE


Angel 8/30/2023 10:58:00 PM

i think you have the answers wrong regarding question: "what are three core principles of web content accessibility guidelines (wcag)? answer: robust, operable, understandable
UNITED STATES


SH 5/16/2023 1:43:00 PM

these questions are not valid , they dont come for the exam now
UNITED STATES


sudhagar 9/6/2023 3:02:00 PM

question looks valid
UNITED STATES


Van 11/24/2023 4:02:00 AM

good for practice
Anonymous


Divya 8/2/2023 6:54:00 AM

need more q&a to go ahead
Anonymous


Rakesh 10/6/2023 3:06:00 AM

question 59 - a newly-created role is not assigned to any user, nor granted to any other role. answer is b https://docs.snowflake.com/en/user-guide/security-access-control-overview
Anonymous


Nik 11/10/2023 4:57:00 AM

just passed my exam today. i saw all of these questions in my text today. so i can confirm this is a valid dump.
HONG KONG


Deep 6/12/2023 7:22:00 AM

needed dumps
INDIA


tumz 1/16/2024 10:30:00 AM

very helpful
UNITED STATES


NRI 8/27/2023 10:05:00 AM

will post once the exam is finished
UNITED STATES


kent 11/3/2023 10:45:00 AM

relevant questions
Anonymous


Qasim 6/11/2022 9:43:00 AM

just clear exam on 10/06/2202 dumps is valid all questions are came same in dumps only 2 new questions total 46 questions 1 case study with 5 question no lab/simulation in my exam please check the answers best of luck
Anonymous


Cath 10/10/2023 10:09:00 AM

q.112 - correct answer is c - the event registry is a module that provides event definitions. answer a - not correct as it is the definition of event log
VIET NAM


Shiji 10/15/2023 1:31:00 PM

good and useful.
INDIA


Ade 6/25/2023 1:14:00 PM

good questions
Anonymous


Praveen P 11/8/2023 5:18:00 AM

good content
UNITED STATES