WGU Cybersecurity-Architecture-and-Engineering Exam (page: 6)
WGU Cybersecurity Architecture and Engineering (KFO1/D488)
Updated on: 24-Mar-2026

Which type of communications media uses light waves to transmit data?

  1. Fiber optic
  2. Radio towers
  3. Twisted pair
  4. Coaxial

Answer(s): A

Explanation:

Fiber optic communications use light waves to transmit data.

This method allows for high-speed and long-distance data transmission.

The other options:

Radio towers use radio waves.

Twisted pair uses electrical signals.

Coaxial also uses electrical signals.

Therefore, the correct communication medium that uses light waves is fiber optic.


Reference:

"Fiber-Optic Communication Systems" by Govind P. Agrawal, which details how fiber optics use light for data transmission.

"Communication Networks" by Alberto Leon-Garcia and Indra Widjaja, which explains various communication media.



Which device does a Local Area Network (LAN) need to communicate over the Internet?

  1. Multiplexer
  2. Repeater
  3. Switch
  4. Router

Answer(s): D

Explanation:

A Local Area Network (LAN) requires a router to communicate over the Internet.

The router serves as a gateway that connects the LAN to the external network (Internet) and directs data traffic between the LAN and the Internet.

The other options:

Multiplexer combines multiple signals into one.

Repeater amplifies signals to extend the range.

Switch connects devices within the LAN but does not facilitate Internet communication.

Therefore, a router is the necessary device for a LAN to communicate over the Internet.


Reference:

"Computer Networking: A Top-Down Approach" by James Kurose and Keith Ross, which explains network devices and their functions.

"CCNA Routing and Switching Study Guide" by Todd Lammle, which covers routers and their roles in networks.



What are two roles of a DNS?

Choose 2 answers

  1. Creating IP addresses if it cannot find an alias
  2. Storing the IP address
  3. Translating an IP alias to an actual IP address
  4. Sending packets along a pathway that connects it to the Internet

Answer(s): B,C

Explanation:

The Domain Name System (DNS) has several key roles, including:

Storing the IP addresses associated with domain names.

Translating human-readable domain names (aliases) into IP addresses that computers use to identify each other on the network.

The other options:

Creating IP addresses if it cannot find an alias is incorrect; DNS does not create IP addresses.

Sending packets along a pathway that connects it to the Internet is the role of routers and not DNS.

Therefore, storing the IP address and translating an IP alias to an actual IP address are the correct roles of DNS.


Reference:

"DNS and BIND" by Paul Albitz and Cricket Liu, which details the functions and roles of DNS.

"The Practice of System and Network Administration" by Thomas Limoncelli, Christina Hogan, and Strata Chalup, which explains DNS operations.



Which part of the Uniform Resource Locator (URL) identifies the server on which the web page can be found?

  1. Resource path ID
  2. Domain name
  3. Protocol
  4. IP address

Answer(s): B

Explanation:

The domain name in a Uniform Resource Locator (URL) identifies the server on which the web page can be found.

Example: In the URL "http://www.example.com/index.html":

"http" is the protocol.

"www.example.com" is the domain name.

"/index.html" is the resource path ID.

The other options:

The protocol specifies the communication method.

The resource path ID specifies the specific page or resource on the server.

The IP address is not typically visible in the URL itself but can be resolved via DNS.

Therefore, the domain name is the correct part that identifies the server.


Reference:

"Web Development and Design Foundations with HTML5" by Terry Felke-Morris, which explains URL components.

"Internet and World Wide Web How to Program" by Paul Deitel and Harvey Deitel, which covers URLs and their structure.



What is the purpose of the feature that allows only one user to modify a document at a time in collaboration software?

  1. Data availability
  2. Data integrity
  3. Data confidentiality
  4. Data accessibility

Answer(s): B

Explanation:

The feature in collaboration software that allows only one user to modify a document at a time ensures data integrity.

Data integrity refers to the accuracy and consistency of data over its lifecycle.

By restricting modification access to one user at a time, the system prevents concurrent changes that could lead to data conflicts or corruption.

The other options:

Data availability ensures data is accessible when needed.

Data confidentiality ensures data is protected from unauthorized access.

Data accessibility refers to the ease of accessing data.

Therefore, ensuring data integrity is the purpose of this feature.


Reference:

"Database Systems: The Complete Book" by Hector Garcia-Molina, Jeffrey D. Ullman, and Jennifer Widom, which discusses data integrity.

"Collaborative Computing: Theory, Practice, and Tools" by Vladimir Dimitrov, which covers features in collaboration software.



Which technique allows someone to obtain a password while it is in transit?

  1. Packet sniffing
  2. Buffer overflow
  3. Phishing
  4. Black hat

Answer(s): A

Explanation:

Packet sniffing is a technique used to capture and analyze network traffic, which can include intercepting passwords while they are in transit.

When data packets are transmitted over a network, a packet sniffer can capture these packets, and if they are not encrypted, it can read sensitive information like passwords.

The other options:

Buffer overflow is a type of attack that exploits a program's memory handling.

Phishing is a social engineering attack to deceive users into providing sensitive information.

Black hat refers to a hacker with malicious intent, not a specific technique.

Therefore, packet sniffing is the correct technique for obtaining passwords in transit.


Reference:

"Network Security Essentials: Applications and Standards" by William Stallings, which explains packet sniffing and network security threats.

"Computer Security: Principles and Practice" by William Stallings and Lawrie Brown, which covers network attack techniques including packet sniffing.



Which is true about access rights?

  1. They limit users to permitted items.
  2. They are part of the System Development Life Cycle.
  3. They require the use of a compiler.
  4. They are defined by the machine language.

Answer(s): A

Explanation:

Access rights are critical components of access control mechanisms in information security. They specify what actions users or systems can perform on specific resources, limiting them to only permitted items.

Definition: Access rights, also known as permissions, are rules that define the allowed actions on a resource (e.g., read, write, execute).

Implementation: Access rights are typically implemented using Access Control Lists (ACLs), Role- Based Access Control (RBAC), or other access control models.

Purpose: The main goal is to enforce the principle of least privilege, ensuring that users can only access the resources necessary for their role.

Reference

NIST Special Publication 800-53

ISO/IEC 27001:2013

"Computer Security: Principles and Practice" by William Stallings



Which characteristic applies to machine-level languages?

  1. They use language translators known as compilers
  2. They use cables to connect circuits
  3. They use collection of short scripts
  4. They use language translators known as assemblers

Answer(s): D

Explanation:

Machine-level languages, also known as assembly languages, are low-level programming languages that are closely related to machine code.

Definition: Machine-level languages consist of instructions that are directly executed by a computer's CPU.

Assemblers: An assembler is a tool that translates assembly language code into machine code.

Characteristics: Assembly languages are specific to a computer architecture and provide a way to write programs that can be executed by the hardware directly.

Reference

"Structured Computer Organization" by Andrew S. Tanenbaum

"Computer Systems: A Programmer's Perspective" by Randal E. Bryant and David R. O'Hallaron



Viewing Page 6 of 30



Share your comments for WGU Cybersecurity-Architecture-and-Engineering exam with other users:

beast 7/30/2023 2:22:00 PM

hi i want it please please upload it
Anonymous


Mirex 5/26/2023 3:45:00 AM

am preparing for exam ,just nice questions
Anonymous


exampei 8/7/2023 8:05:00 AM

please upload c_tadm_23 exam
TURKEY


Anonymous 9/12/2023 12:50:00 PM

can we get tdvan4 vantage data engineering pdf?
UNITED STATES


Aish 10/11/2023 5:51:00 AM

want to clear the exam.
INDIA


Smaranika 6/22/2023 8:42:00 AM

could you please upload the dumps of sap c_sac_2302
INDIA


Blessious Phiri 8/15/2023 1:56:00 PM

asm management configuration is about storage
Anonymous


Lewis 7/6/2023 8:49:00 PM

kool thumb up
UNITED STATES


Moreece 5/15/2023 8:44:00 AM

just passed the az-500 exam this last friday. most of the questions in this exam dumps are in the exam. i bought the full version and noticed some of the questions which were answered wrong in the free version are all corrected in the full version. this site is good but i wish the had it in an interactive version like a test engine simulator.
Anonymous


Terry 5/24/2023 4:41:00 PM

i can practice for exam
Anonymous


Emerys 7/29/2023 6:55:00 AM

please i need this exam.
Anonymous


Goni Mala 9/2/2023 12:27:00 PM

i need the dump
Anonymous


Lenny 9/29/2023 11:30:00 AM

i want it bad, even if cs6 maybe retired, i want to learn cs6
HONG KONG


MilfSlayer 12/28/2023 8:32:00 PM

i hate comptia with all my heart with their "choose the best" answer format as an argument could be made on every question. they say "the "comptia way", lmao no this right here boys is the comptia way 100%. take it from someone whos failed this exam twice but can configure an entire complex network that these are the questions that are on the test 100% no questions asked. the pbqs are dead on! nice work
Anonymous


Swati Raj 11/14/2023 6:28:00 AM

very good materials
UNITED STATES


Ko Htet 10/17/2023 1:28:00 AM

thanks for your support.
Anonymous


Philippe 1/22/2023 10:24:00 AM

iam impressed with the quality of these dumps. they questions and answers were easy to understand and the xengine app was very helpful to use.
CANADA


Sam 8/31/2023 10:32:00 AM

not bad but you question database from isaca
MALAYSIA


Brijesh kr 6/29/2023 4:07:00 AM

awesome contents
INDIA


JM 12/19/2023 1:22:00 PM

answer to 134 is casb. while data loss prevention is the goal, in order to implement dlp in cloud applications you need to deploy a casb.
UNITED STATES


Neo 7/26/2023 9:36:00 AM

are these brain dumps sufficient enough to go write exam after practicing them? or does one need more material this wont be enough?
SOUTH AFRICA


Bilal 8/22/2023 6:33:00 AM

i did attend the required cources and i need to be sure that i am ready to take the exam, i would ask you please to share the questions, to be sure that i am fit to proceed with taking the exam.
Anonymous


John 11/12/2023 8:48:00 PM

why only give explanations on some, and not all questions and their respective answers?
UNITED STATES


Biswa 11/20/2023 8:50:00 AM

refresh db knowledge
Anonymous


Shalini Sharma 10/17/2023 8:29:00 AM

interested for sap certification
JAPAN


ethan 9/24/2023 12:38:00 PM

could you please upload practice questions for scr exam ?
HONG KONG


vijay joshi 8/19/2023 3:15:00 AM

please upload free oracle cloud infrastructure 2023 foundations associate exam braindumps
Anonymous


Ayodele Talabi 8/25/2023 9:25:00 PM

sweating! they are tricky
CANADA


Romero 3/23/2022 4:20:00 PM

i never use these dumps sites but i had to do it for this exam as it is impossible to pass without using these question dumps.
UNITED STATES


John Kennedy 9/20/2023 3:33:00 AM

good practice and well sites.
Anonymous


Nenad 7/12/2022 11:05:00 PM

passed my first exam last week and pass the second exam this morning. thank you sir for all the help and these brian dumps.
INDIA


Lucky 10/31/2023 2:01:00 PM

does anyone who attended exam csa 8.8, can confirm these questions are really coming ? or these are just for practicing?
HONG KONG


Prateek 9/18/2023 11:13:00 AM

kindly share the dumps
UNITED STATES


Irfan 11/25/2023 1:26:00 AM

very nice content
Anonymous