WGU Cybersecurity-Architecture-and-Engineering Exam (page: 6)
WGU Cybersecurity Architecture and Engineering (KFO1/D488)
Updated on: 09-Feb-2026

Which type of communications media uses light waves to transmit data?

  1. Fiber optic
  2. Radio towers
  3. Twisted pair
  4. Coaxial

Answer(s): A

Explanation:

Fiber optic communications use light waves to transmit data.

This method allows for high-speed and long-distance data transmission.

The other options:

Radio towers use radio waves.

Twisted pair uses electrical signals.

Coaxial also uses electrical signals.

Therefore, the correct communication medium that uses light waves is fiber optic.


Reference:

"Fiber-Optic Communication Systems" by Govind P. Agrawal, which details how fiber optics use light for data transmission.

"Communication Networks" by Alberto Leon-Garcia and Indra Widjaja, which explains various communication media.



Which device does a Local Area Network (LAN) need to communicate over the Internet?

  1. Multiplexer
  2. Repeater
  3. Switch
  4. Router

Answer(s): D

Explanation:

A Local Area Network (LAN) requires a router to communicate over the Internet.

The router serves as a gateway that connects the LAN to the external network (Internet) and directs data traffic between the LAN and the Internet.

The other options:

Multiplexer combines multiple signals into one.

Repeater amplifies signals to extend the range.

Switch connects devices within the LAN but does not facilitate Internet communication.

Therefore, a router is the necessary device for a LAN to communicate over the Internet.


Reference:

"Computer Networking: A Top-Down Approach" by James Kurose and Keith Ross, which explains network devices and their functions.

"CCNA Routing and Switching Study Guide" by Todd Lammle, which covers routers and their roles in networks.



What are two roles of a DNS?

Choose 2 answers

  1. Creating IP addresses if it cannot find an alias
  2. Storing the IP address
  3. Translating an IP alias to an actual IP address
  4. Sending packets along a pathway that connects it to the Internet

Answer(s): B,C

Explanation:

The Domain Name System (DNS) has several key roles, including:

Storing the IP addresses associated with domain names.

Translating human-readable domain names (aliases) into IP addresses that computers use to identify each other on the network.

The other options:

Creating IP addresses if it cannot find an alias is incorrect; DNS does not create IP addresses.

Sending packets along a pathway that connects it to the Internet is the role of routers and not DNS.

Therefore, storing the IP address and translating an IP alias to an actual IP address are the correct roles of DNS.


Reference:

"DNS and BIND" by Paul Albitz and Cricket Liu, which details the functions and roles of DNS.

"The Practice of System and Network Administration" by Thomas Limoncelli, Christina Hogan, and Strata Chalup, which explains DNS operations.



Which part of the Uniform Resource Locator (URL) identifies the server on which the web page can be found?

  1. Resource path ID
  2. Domain name
  3. Protocol
  4. IP address

Answer(s): B

Explanation:

The domain name in a Uniform Resource Locator (URL) identifies the server on which the web page can be found.

Example: In the URL "http://www.example.com/index.html":

"http" is the protocol.

"www.example.com" is the domain name.

"/index.html" is the resource path ID.

The other options:

The protocol specifies the communication method.

The resource path ID specifies the specific page or resource on the server.

The IP address is not typically visible in the URL itself but can be resolved via DNS.

Therefore, the domain name is the correct part that identifies the server.


Reference:

"Web Development and Design Foundations with HTML5" by Terry Felke-Morris, which explains URL components.

"Internet and World Wide Web How to Program" by Paul Deitel and Harvey Deitel, which covers URLs and their structure.



What is the purpose of the feature that allows only one user to modify a document at a time in collaboration software?

  1. Data availability
  2. Data integrity
  3. Data confidentiality
  4. Data accessibility

Answer(s): B

Explanation:

The feature in collaboration software that allows only one user to modify a document at a time ensures data integrity.

Data integrity refers to the accuracy and consistency of data over its lifecycle.

By restricting modification access to one user at a time, the system prevents concurrent changes that could lead to data conflicts or corruption.

The other options:

Data availability ensures data is accessible when needed.

Data confidentiality ensures data is protected from unauthorized access.

Data accessibility refers to the ease of accessing data.

Therefore, ensuring data integrity is the purpose of this feature.


Reference:

"Database Systems: The Complete Book" by Hector Garcia-Molina, Jeffrey D. Ullman, and Jennifer Widom, which discusses data integrity.

"Collaborative Computing: Theory, Practice, and Tools" by Vladimir Dimitrov, which covers features in collaboration software.



Which technique allows someone to obtain a password while it is in transit?

  1. Packet sniffing
  2. Buffer overflow
  3. Phishing
  4. Black hat

Answer(s): A

Explanation:

Packet sniffing is a technique used to capture and analyze network traffic, which can include intercepting passwords while they are in transit.

When data packets are transmitted over a network, a packet sniffer can capture these packets, and if they are not encrypted, it can read sensitive information like passwords.

The other options:

Buffer overflow is a type of attack that exploits a program's memory handling.

Phishing is a social engineering attack to deceive users into providing sensitive information.

Black hat refers to a hacker with malicious intent, not a specific technique.

Therefore, packet sniffing is the correct technique for obtaining passwords in transit.


Reference:

"Network Security Essentials: Applications and Standards" by William Stallings, which explains packet sniffing and network security threats.

"Computer Security: Principles and Practice" by William Stallings and Lawrie Brown, which covers network attack techniques including packet sniffing.



Which is true about access rights?

  1. They limit users to permitted items.
  2. They are part of the System Development Life Cycle.
  3. They require the use of a compiler.
  4. They are defined by the machine language.

Answer(s): A

Explanation:

Access rights are critical components of access control mechanisms in information security. They specify what actions users or systems can perform on specific resources, limiting them to only permitted items.

Definition: Access rights, also known as permissions, are rules that define the allowed actions on a resource (e.g., read, write, execute).

Implementation: Access rights are typically implemented using Access Control Lists (ACLs), Role- Based Access Control (RBAC), or other access control models.

Purpose: The main goal is to enforce the principle of least privilege, ensuring that users can only access the resources necessary for their role.

Reference

NIST Special Publication 800-53

ISO/IEC 27001:2013

"Computer Security: Principles and Practice" by William Stallings



Which characteristic applies to machine-level languages?

  1. They use language translators known as compilers
  2. They use cables to connect circuits
  3. They use collection of short scripts
  4. They use language translators known as assemblers

Answer(s): D

Explanation:

Machine-level languages, also known as assembly languages, are low-level programming languages that are closely related to machine code.

Definition: Machine-level languages consist of instructions that are directly executed by a computer's CPU.

Assemblers: An assembler is a tool that translates assembly language code into machine code.

Characteristics: Assembly languages are specific to a computer architecture and provide a way to write programs that can be executed by the hardware directly.

Reference

"Structured Computer Organization" by Andrew S. Tanenbaum

"Computer Systems: A Programmer's Perspective" by Randal E. Bryant and David R. O'Hallaron



Viewing Page 6 of 30



Share your comments for WGU Cybersecurity-Architecture-and-Engineering exam with other users:

NJ 12/24/2025 10:39:07 AM

Helpful to test your preparedness before giving exam
Anonymous


Ashwini 12/17/2025 8:24:45 AM

Really helped
Anonymous


Jagadesh 12/16/2025 9:57:10 AM

Good explanation
INDIA


shobha 11/29/2025 2:19:59 AM

very helpful
INDIA


Pandithurai 11/12/2025 12:16:21 PM

Question 1, Ans is - Developer,Standard,Professional Direct and Premier
Anonymous


Einstein 11/8/2025 4:13:37 AM

Passed this exam in first appointment. Great resource and valid exam dump.
Anonymous


David 10/31/2025 4:06:16 PM

Today I wrote this exam and passed, i totally relay on this practice exam. The questions were very tough, these questions are valid and I encounter the same.
UNITED STATES


Thor 10/21/2025 5:16:29 AM

Anyone used this dump recently?
NEW ZEALAND


Vladimir 9/25/2025 9:11:14 AM

173 question is A not D
Anonymous


khaos 9/21/2025 7:07:26 AM

nice questions
Anonymous


Katiso Lehasa 9/15/2025 11:21:52 PM

Thanks for the practice questions they helped me a lot.
Anonymous


Einstein 9/2/2025 7:42:00 PM

Passed this exam today. All questions are valid and this is not something you can find in ChatGPT.
UNITED KINGDOM


vito 8/22/2025 4:16:51 AM

i need to pass exam for VMware 2V0-11.25
Anonymous


Matt 7/31/2025 11:44:40 PM

Great questions.
UNITED STATES


OLERATO 7/1/2025 5:44:14 AM

great dumps to practice for the exam
SOUTH AFRICA


Adekunle willaims 6/9/2025 7:37:29 AM

How reliable and relevant are these questions?? also i can see the last update here was January and definitely new questions would have emerged.
Anonymous


Alex 5/24/2025 12:54:15 AM

Can I trust to this source?
Anonymous


SPriyak 3/17/2025 11:08:37 AM

can you please provide the CBDA latest test preparation
UNITED STATES


Chandra 11/28/2024 7:17:38 AM

This is the best and only way of passing this exam as it is extremely hard. Good questions and valid dump.
INDIA


Sunak 1/25/2025 9:17:57 AM

Can I use this dumps when I am taking the exam? I mean does somebody look what tabs or windows I have opened ?
BULGARIA


Frank 2/15/2024 11:36:57 AM

Finally got a change to write this exam and pass it! Valid and accurate!
CANADA


Anonymous User 2/2/2024 6:42:12 PM

Upload this exam please!
Anonymous


Nicholas 2/2/2024 6:17:08 PM

Thank you for providing these questions. It helped me a lot with passing my exam.
Anonymous


Timi 8/19/2023 5:30:00 PM

my first attempt
UNITED KINGDOM


Blessious Phiri 8/13/2023 10:32:00 AM

very explainable
Anonymous


m7md ibrahim 5/26/2023 6:21:00 PM

i think answer of q 462 is variance analysis
Anonymous


Tehu 5/25/2023 12:25:00 PM

hi i need see questions
Anonymous


Ashfaq Nasir 1/17/2024 1:19:00 AM

best study material for exam
Anonymous


Roberto 11/27/2023 12:33:00 AM

very interesting repository
ITALY


Nale 9/18/2023 1:51:00 PM

american history 1
Anonymous


Tanvi 9/27/2023 4:02:00 AM

good level of questions
Anonymous


Boopathy 8/17/2023 1:03:00 AM

i need this dump kindly upload it
Anonymous


s_123 8/12/2023 4:28:00 PM

do we need c# coding to be az204 certified
Anonymous


Blessious Phiri 8/15/2023 3:38:00 PM

excellent topics covered
Anonymous