Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D489 Cybersecurity Management – Task 1 Assessment and Exam Preparation Material

Beoordeling
-
Verkocht
-
Pagina's
110
Cijfer
A+
Geüpload op
23-02-2026
Geschreven in
2025/2026

This exam preparation material is designed for WGU D489 Cybersecurity Management Task 1 and aligns with course competencies related to governance, risk management, compliance, and organizational cybersecurity strategy. It includes scenario-based and exam-style questions with answers covering risk assessment, security frameworks (such as NIST and ISO), policy development, business continuity planning, incident response, security awareness training, and leadership decision-making in cybersecurity environments. The material supports competency mastery and successful completion of Task 1 performance requirements.

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

WGU D489 TASK 1 | CYBERSECURITY
MANAGEMENT | EXAM QUESTIONS &
CORRECT ANSWERS

1.

A company is implementing a new security policy that requires multi-factor
authentication (MFA) for all remote access. Which of the following best describes
the primary benefit of MFA?
A. It eliminates the need for passwords.
B. It reduces the risk of credential theft and unauthorized access.
C. It simplifies user access management.
D. It removes the need for logging and auditing.
Answer: B
Rationale: MFA requires multiple authentication factors, making it much harder
for attackers to compromise accounts even if passwords are stolen.


2.

A security manager is reviewing access control policies and wants to ensure that
users only have access to what they need to perform their jobs. Which principle is
being applied?
A. Least Privilege
B. Separation of Duties
C. Need to Know
D. Role-Based Access Control
Answer: A
Rationale: Least privilege limits user access to only what is necessary for their
role, reducing risk.

,3.

A company’s SOC has detected unusual outbound traffic from a workstation to an
unknown IP address. The security analyst suspects malware. What should be the
FIRST action?
A. Notify the CEO.
B. Disconnect the workstation from the network.
C. Reboot the workstation.
D. Update antivirus definitions.
Answer: B
Rationale: Disconnecting the system prevents further data exfiltration and limits
spread while preserving evidence.


4.

During a risk assessment, an analyst identifies that the company has a single point
of failure in its data center power supply. This is an example of what type of risk?
A. Strategic Risk
B. Operational Risk
C. Compliance Risk
D. Financial Risk
Answer: B
Rationale: Operational risk includes disruptions in systems or processes that affect
business continuity.


5.

A company is developing its incident response plan. Which of the following is the
most important reason for including a communication plan?
A. To ensure the IT team can work without interruptions.
B. To ensure stakeholders are informed and legal requirements are met.
C. To reduce the cost of incident response.
D. To eliminate the need for documentation.

,Answer: B
Rationale: Communication plans ensure proper notification of stakeholders,
regulatory compliance, and coordinated response.


6.

Which of the following BEST defines “risk appetite”?
A. The amount of risk a company is willing to accept to achieve objectives
B. The total number of risks identified in an assessment
C. The cost of mitigating all identified risks
D. The probability of a threat occurring
Answer: A
Rationale: Risk appetite is the level of risk an organization is willing to accept.


7.

A company wants to protect sensitive data at rest. Which of the following controls
is MOST appropriate?
A. Data encryption
B. Intrusion detection system
C. Network segmentation
D. Vulnerability scanning
Answer: A
Rationale: Encryption protects data at rest by making it unreadable without the
correct keys.

, 8.

A security team uses a vulnerability scanner to identify weaknesses in their web
applications. The scanner finds a SQL injection vulnerability. Which phase of the
SDLC is MOST important to address this vulnerability?
A. Requirements
B. Design
C. Development
D. Maintenance
Answer: C
Rationale: SQL injection vulnerabilities are typically introduced during
development and should be addressed through secure coding practices.


9.

A healthcare organization must comply with HIPAA. What is the primary focus of
HIPAA?
A. Protecting financial transactions
B. Protecting patient health information
C. Protecting government data
D. Protecting intellectual property
Answer: B
Rationale: HIPAA protects the confidentiality, integrity, and availability of
protected health information (PHI).

Geschreven voor

Vak

Documentinformatie

Geüpload op
23 februari 2026
Aantal pagina's
110
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$17.08
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
Jackie247

Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
Jackie247 California State University - East Bay
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
3
Lid sinds
8 maanden
Aantal volgers
3
Documenten
218
Laatst verkocht
3 maanden geleden
Jackie247 Test Banks and Practice Exams

Jackie247 Test Banks and Practice Exams Struggling to find the perfect study materials? Welcome to Jackie247! We specialize in delivering high-quality test banks, practice exams, and study resources to make exam prep stress-free and effective. Tip: Success doesn’t happen by chance. It happens by choice. Choose Dokkie247 Test Banks and Practice Exams! Study smart, not hard. Your success story starts here! Let’s make exam success your new normal.

Lees meer Lees minder
0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen