Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D488 Cybersecurity Architecture & Engineering FINAL EXAM / OBJECTIVE ASSESSMENT (OA) PRACTICE TEST BANK 100 QUESTIONS WITH ANSWERS AND RATIONALES

Beoordeling
-
Verkocht
-
Pagina's
57
Cijfer
A+
Geüpload op
01-03-2026
Geschreven in
2025/2026

WGU D488 Cybersecurity Architecture & Engineering FINAL EXAM / OBJECTIVE ASSESSMENT (OA) PRACTICE TEST BANK 100 QUESTIONS WITH ANSWERS AND RATIONALES

Instelling
Vak

Voorbeeld van de inhoud

WGU D488 OA Final Exam Test Bank/WGU D488
Cybersecurity Architecture & Engineering Newest
2025/2026 Complete All 230 Questions And Correct
Detailed Answers |Already Graded A+||Already Graded
A+


1. A company is looking to protect sensitive data stored on its storage devices and
ensure that this data is secure from unauthorized access. The company is
looking for a solution that provides a high level of security and protection for its
data. Which security technology will protect sensitive data stored on the
company's storage devices by automatically initiating security procedures as
they are written to the device?
A Self-encrypting drives
B - Hardware security module (HSM)
C- Two-factor authentication
D- Measured boot - ANSWER-A- Self-encrypting drives


2. A company is concerned about advanced persistent threats and targeted attacks
on its computer systems. The company wants to implement a security solution
that can detect and respond to any suspicious activity on its systems. Which
security technology meets the needs of this company?
A - Endpoint detection and response (EDR) software
B - Hardware security module (HSM)
C - Two-factor authentication
D - Antivirus tools - ANSWER-A - Endpoint detection and response (EDR)
software

,3. An enterprise is deploying a new software application that requires a
cryptographic protocol to secure data transmission. The application will be used
to process sensitive customer information, and the company wants to ensure
that the data is protected during transmission. Which cryptographic protocol
meets the needs of the enterprise?


A - Point-to-Point Tunneling Protocol (PPTP) with Triple Data Encryption
Standard (3DES)
B - Secure Sockets Layer (SSL) with Data Encryption Standard (DES)
C- Transport Layer Security (TLS) with Advanced Encryption Standard (AES)
D - Hypertext Transfer Protocol Secure (HTTPS) with Rivest- Shamir-Adleman
(RSA) - ANSWER-C-Transport Layer Security (TLS) with Advanced Encryption
Standard (AES)


4. Which emerging technology has the potential to significantly impact the
security of current encryption methods by making it possible to quickly solve
mathematical problems that are currently considered difficult or impossible to
solve?
A - Blockchain
B - Quantum computing
C - Artificial intelligence (AI)
D - Augmented reality (AR) - ANSWER-B - Quantum computing
Which public-key cryptosystem uses prime factorization as the basis for its
security?
A - Rivest-Shamir-Adleman (RSA)
B - Digital Signature Algorithm (DSA)
C - Elliptic Curve Digital Signature Algorithm (ECDSA)
D - Diffie-Hellman (DH) - ANSWER-A - Rivest-Shamir-

,5. Which key exchange algorithm is used to establish a shared secret key between
two parties without the need for a pre-shared secret or public key exchange?
A-Diffie-Hellman (DH)
B - Rivest-Shamir-Adleman (RSA)
C - Digital Signature Algorithm (DSA)
D - Elliptic Curve Diffie-Hellman (ECDH) - ANSWER-A- Diffie-Hellman (DH)


6. The company plans to deploy a cryptographic system for their digital
signatures, which employs a public key cryptosystem that is based on figures
described by the equation y^2 = x^3+ ax + b. Which public-key cryptosystem
does this describe?
A - Digital Signature Algorithm (DSA)
B - Rivest-Shamir-Adleman (RSA)
C - Elliptic Curve Digital Signature Algorithm (ECDSA)
D - Diffie-Hellman (DH) - ANSWER-C - Elliptic Curve Digital Signature
Algorithm (ECDSA)


7. A company operates a customer service call center with over one hundred
agents taking inbound sales calls. After a recent security breach, the security
team believes that one or more agents have been stealing customer credit card
details. Which solution will defend against this issue?

A Security information and event management (SIEM)
B File integrity monitoring (FIM)
C - Data loss prevention (DLP)
D - Intrusion detection system (IDS) – ANSWER C-Data loss prevention (DLP)

, 8. The security team has noticed that several endpoints on the network have been
infected with malware. Leadership has tasked the security team with identifying
these attacks in the future. Which solution will notify the team automatically in
the event of future malware variants invading the network?

A - Security information and event management (SIEM) alerts
B - Data loss prevention (DLP) alerts
C - Antivirus alerts
D - Syslog alerts - ANSWER-Antivirus alerts


9. An engineer has noticed a degradation in system performance and alerts
regarding high central processing unit (CPU) usage on multiple virtual
machines in the environment. Further investigation shows that several unknown
processes are running on the affected systems. What is the explanation for the
degradation in system performance and alerts regarding high central processing
unit (CPU) usage?

A-Misconfigured firewall
B - Overly permissive web application firewall (WAF) rules
C - Outdated anti-malware signatures
D - Incorrect file permissions - ANSWER-Outdated anti-malware signatures


10.A financial services company has experienced several incidents of data
breaches in recent months. The company has analyzed the indicators of
compromise and determined that the data decided to implement hardening
techniques and endpoint security controls to mitigate the risk. What should be

Geschreven voor

Vak

Documentinformatie

Geüpload op
1 maart 2026
Aantal pagina's
57
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$22.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
JPaul
5.0
(1)

Maak kennis met de verkoper

Seller avatar
JPaul Chamberlain College Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
6
Lid sinds
1 jaar
Aantal volgers
0
Documenten
698
Laatst verkocht
1 week geleden
Nursing Exam Success Hub

This store provides high-quality, exam-focused nursing study resources designed to support students in ATI, NR, MSN, and NCLEX-style exams. All materials are carefully structured to reflect current exam formats and focus on clinical judgment, pharmacology, prioritization, and safe nursing practice. Each document includes clear explanations and rationales to support effective learning and exam readiness. Ideal for undergraduate and graduate nursing students seeking reliable, exam-oriented study materials.

Lees meer Lees minder
5.0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen