Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

D488 - Cybersecurity Architecture and Engineering 2025 (CASP+) 1074 Complete Solutions DETAILED

Beoordeling
-
Verkocht
-
Pagina's
338
Cijfer
A+
Geüpload op
27-01-2026
Geschreven in
2025/2026

D488 - Cybersecurity Architecture and Engineering 2025 (CASP+) 1074 Complete Solutions DETAILED

Instelling
Vak

Voorbeeld van de inhoud

D488 - Cybersecurity Architecture and
Engineering (CASP+) 1074 Complete
Solutions DETAILED.
D488 - Cybersecurity Architecture and
Engineering (CASP+) 1074 Complete
Solutions DETAILED.
The security team recently enabled public access to a web application hosted on a server inside the
corporate network. The developers of the application report that the server has received several
structured query language (SQL) injection attacks in the past several days. The team needs to deploy a
solution that will block the SQL injection attacks.



Which solution fulfills these requirements?



A) Virtual private network (VPN)

B) Security information and event management (SIEM)

C) Web application firewall (WAF)

D) Secure Socket Shell (SSH) - ANSWER C) Web application firewall (WAF)



An IT security team has been notified that external contractors are using their personal laptops to gain
access to the corporate network. The team needs to recommend a solution that will prevent
unapproved devices from accessing the network.



Which solution fulfills these requirements?



A) Implementing a demilitarized zone (DMZ)

B) Installing a hardware security module

C) Implementing port security

D) Deploying a software firewall - ANSWER C) Implementing port security

,D488 - Cybersecurity Architecture and
Engineering (CASP+) 1074 Complete
Solutions DETAILED.
The chief technology officer for a small publishing company has been tasked with improving the
company's security posture. As part of a network upgrade, the company has decided to implement
intrusion detection, spam filtering, content filtering, and antivirus controls. The project needs to be
completed using the least amount of infrastructure while meeting all requirements.



Which solution fulfills these requirements?



A) Deploying an anti-spam gateway

B) Deploying a proxy server

C) Deploying a unified threat management (UTM) appliance

D) Deploying a web application firewall (WAF) - ANSWER C) Deploying a unified threat management
(UTM) appliance



The security team plans to deploy an intrusion detection system (IDS) solution to alert engineers about
inbound threats. The team already has a database of signatures that they want the IDS solution to
validate.



Which detection technique meets the requirements?



A) Intrusion detection

B) Deep packet inspection

C) Signature-based detection

D) Intrusion prevention - ANSWER C) Signature-based detection



An IT organization had a security breach after deploying an update to its production web servers. The
application currently goes through a manual update process a few times per year. The security team
needs to recommend a failback option for future deployments.



Which solution fulfills these requirements?

,D488 - Cybersecurity Architecture and
Engineering (CASP+) 1074 Complete
Solutions DETAILED.

A) Implementing a code scanner

B) Implementing code signing

C) Implementing versioning

D) Implementing a security requirements traceability matrix (SRTM) - ANSWER C) Implementing
versioning



A software development team is working on a new mobile application that will be used by customers.
The security team must ensure that builds of the application will be trusted by a variety of mobile
devices.



Which solution fulfills these requirements?



A) Code scanning

B) Regression testing

C) Code signing

D) Continuous delivery - ANSWER C) Code signing



An IT organization recently suffered a data leak incident. Management has asked the security team to
implement a print blocking mechanism for all documents stored on a corporate file share.



Which solution fulfills these requirements?



A) Virtual desktop infrastructure (VDI)

B) Remote Desktop Protocol (RDP)

C) Digital rights management (DRM)

D) Watermarking - ANSWER C) Digital rights management (DRM)

, D488 - Cybersecurity Architecture and
Engineering (CASP+) 1074 Complete
Solutions DETAILED.

A company has recently discovered that a competitor is distributing copyrighted videos produced by the
in-house marketing team. Management has asked the security team to prevent these types of violations
in the future.



Which solution fulfills these requirements?



A) Virtual desktop infrastructure (VDI)

B) Secure Socket Shell (SSH)

C) Digital rights management (DRM)

D) Remote Desktop Protocol (RDP) - ANSWER C) Digital rights management (DRM)



A security team has been tasked with performing regular vulnerability scans for a cloud-based
infrastructure.



How should these vulnerability scans be conducted when implementing zero trust security?



A) Manually

B) Annually

C) Automatically

D) As needed - ANSWER C) Automatically



A healthcare company needs to ensure that medical researchers cannot inadvertently share protected
health information (PHI) data from medical records.



What is the best solution?

Geschreven voor

Vak

Documentinformatie

Geüpload op
27 januari 2026
Aantal pagina's
338
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$12.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
TestBankStuvia Howard Community College
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
139
Lid sinds
1 jaar
Aantal volgers
16
Documenten
1812
Laatst verkocht
1 week geleden
I have Accounting, Finance, Statistics, Computer Science, Nursing and other Subjects A+ solutions

Nursing Being my main profession line, My mission is to be your LIGHT in the dark. If you're worried or having trouble in nursing school, I really want my notes to be your guide! I know they have helped countless others get through and that's all I want for YOU! All the materials posted are A+ Graded. Please rate and write a review after using my materials. Your reviews will motivate me to add more materials. Thank You So Much!!!

Lees meer Lees minder
4.5

86 beoordelingen

5
64
4
14
3
2
2
0
1
6

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen