Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D488 Cybersecurity Architecture and Engineering CASP+ Exam Questions and Answers Study Guide

Rating
-
Sold
-
Pages
455
Grade
A+
Uploaded on
23-03-2026
Written in
2025/2026

This document provides a comprehensive set of questions and correct answers for the WGU D488 Cybersecurity Architecture and Engineering (CASP+) exam, covering advanced security concepts, risk management, and enterprise security architecture. It includes topics such as access control models, cryptography, network security, cloud security, incident response, and compliance frameworks. The material is structured as an extensive exam review, making it ideal for reinforcing technical knowledge and preparing for advanced cybersecurity certification.

Show more Read less
Institution
WGU D488 Cybersecurity Architecture & Engineering
Course
WGU D488 Cybersecurity Architecture & Engineering

Content preview

WGU D488 - Cybersecurity Architecture and
Engineering (CASP+) exam questions and correct
answers



The security team recently enabled public access to a web application hosted on a
server inside the corporate network. The developers of the application report that the
server has received several structured query language (SQL) injection attacks in the past
several days. The team needs to deploy a solution that will block the SQL injection
attacks.



Which solution fulfills these requirements?



A) Virtual private network (VPN)

B) Security information and event management (SIEM)

C) Web application firewall (WAF)

D) Secure Socket Shell (SSH)

C) Web application firewall (WAF)




An IT security team has been notified that external contractors are using their personal
laptops to gain access to the corporate network. The team needs to recommend a
solution that will prevent unapproved devices from accessing the network.



Which solution fulfills these requirements?



A) Implementing a demilitarized zone (DMZ)

,B) Installing a hardware security module

C) Implementing port security

D) Deploying a software firewall

C) Implementing port security




The chief technology officer for a small publishing company has been tasked with
improving the company's security posture. As part of a network upgrade, the company
has decided to implement intrusion detection, spam filtering, content filtering, and
antivirus controls. The project needs to be completed using the least amount of
infrastructure while meeting all requirements.



Which solution fulfills these requirements?



A) Deploying an anti-spam gateway

B) Deploying a proxy server

C) Deploying a unified threat management (UTM) appliance

D) Deploying a web application firewall (WAF)

C) Deploying a unified threat management (UTM) appliance




The security team plans to deploy an intrusion detection system (IDS) solution to alert
engineers about inbound threats. The team already has a database of signatures that
they want the IDS solution to validate.



Which detection technique meets the requirements?

,A) Intrusion detection

B) Deep packet inspection

C) Signature-based detection

D) Intrusion prevention

C) Signature-based detection




An IT organization had a security breach after deploying an update to its production web
servers. The application currently goes through a manual update process a few times
per year. The security team needs to recommend a failback option for future
deployments.



Which solution fulfills these requirements?



A) Implementing a code scanner

B) Implementing code signing

C) Implementing versioning

D) Implementing a security requirements traceability matrix (SRTM)

C) Implementing versioning




A software development team is working on a new mobile application that will be used
by customers. The security team must ensure that builds of the application will be
trusted by a variety of mobile devices.

, Which solution fulfills these requirements?



A) Code scanning

B) Regression testing

C) Code signing

D) Continuous delivery

C) Code signing




An IT organization recently suffered a data leak incident. Management has asked the
security team to implement a print blocking mechanism for all documents stored on a
corporate file share.



Which solution fulfills these requirements?



A) Virtual desktop infrastructure (VDI)

B) Remote Desktop Protocol (RDP)

C) Digital rights management (DRM)

D) Watermarking

C) Digital rights management (DRM)




A company has recently discovered that a competitor is distributing copyrighted videos
produced by the in-house marketing team. Management has asked the security team to
prevent these types of violations in the future.

Written for

Institution
WGU D488 Cybersecurity Architecture & Engineering
Course
WGU D488 Cybersecurity Architecture & Engineering

Document information

Uploaded on
March 23, 2026
Number of pages
455
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$13.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Hosmerit Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
345
Member since
2 year
Number of followers
44
Documents
4114
Last sold
1 day ago
HOSMERIT

Welcome to Hosmerit – Your Trusted Source for High-Quality Study Materials Struggling to find reliable and up-to-date resources to help you ace your exams? Look no further. My store offers a wide range of thoroughly researched and well-organized exam guides, test banks, and past papers for various courses and subjects. ✅ Accurate & Up-to-Date – All materials are regularly reviewed to ensure they reflect the most current curriculum. ✅ High-Scoring Content – Get access to study materials that have helped hundreds of students achieve top grades. ✅ Instant Download – Purchase and access your files immediately — no waiting. ✅ Trusted by Students Worldwide – Join a growing number of students who rely on my resources to stay ahead. Whether you're prepping for midterms, finals, or just want to reinforce your understanding, this store is here to help you succeed with confidence.

Read more Read less
4.8

246 reviews

5
219
4
11
3
6
2
4
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions