D488Study
Cybersecurity
Guide Questions
Architecture
and Answers
and Engineering CASP Plus Study Guide Questions and Answers.pdf 2026-03-21
D488 Cybersecurity
Architecture and
Engineering CASP Plus
Study Guide Questions and
Answers
Guidehttps://www.stuvia.com/dashboard!@_)#*)(@$)($@*($@)($@*_ 1
Page 1 of 690 Page 1
,D488 - Cybersecurity Architecture and Engineering (CASP+) D488 - Cybersecurity Architecture and Engineering (CASP+).pdf 2026-03-21
The security team recently enabled public access C) Web application firewall (WAF)
to a web application hosted on a server inside the
corporate network. The developers of the
application report that the server has received
several structured query language (SQL) injection
attacks in the past several days. The team needs
to deploy a solution that will block the SQL
injection attacks.
Which solution fulfills these requirements?
A) Virtual private network (VPN)
B) Security information and event management
(SIEM)
C) Web application firewall (WAF)
D) Secure Socket Shell (SSH)
Page 2 of 690 2 Page 2
,D488 - Cybersecurity Architecture and Engineering (CASP+) D488 - Cybersecurity Architecture and Engineering (CASP+).pdf 2026-03-21
An IT security team has been notified that external C) Implementing port security
contractors are using their personal laptops to
gain access to the corporate network. The team
needs to recommend a solution that will prevent
unapproved devices from accessing the network.
Which solution fulfills these requirements?
A) Implementing a demilitarized zone (DMZ)
B) Installing a hardware security module
C) Implementing port security
D) Deploying a software firewall
Page 3 of 690 3 Page 3
, D488 - Cybersecurity Architecture and Engineering (CASP+) D488 - Cybersecurity Architecture and Engineering (CASP+).pdf 2026-03-21
The chief technology officer for a small publishing C) Deploying a unified threat management (UTM) appliance
company has been tasked with improving the
company's security posture. As part of a network
upgrade, the company has decided to implement
intrusion detection, spam filtering, content
filtering, and antivirus controls. The project needs
to be completed using the least amount of
infrastructure while meeting all requirements.
Which solution fulfills these requirements?
A) Deploying an anti-spam gateway
B) Deploying a proxy server
C) Deploying a unified threat management (UTM)
appliance
D) Deploying a web application firewall (WAF)
Page 4 of 690 4 Page 4