100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU D489 Cybersecurity Management Final Exam 2025/2026 – Latest Questions & Answers| Questions & Answers| Grade A+| 100% Correct (Verified Solutions)-

Puntuación
-
Vendido
-
Páginas
35
Grado
A+
Subido en
16-01-2026
Escrito en
2025/2026

This document provides the latest WGU D489 Cybersecurity Management final exam questions with 100% verified correct answers, aligned to the 2025–2026 assessment standards. It covers governance, risk management, compliance frameworks, and strategic cybersecurity decision-making, offering exam-accurate content designed to support A+ performance and confident exam success.

Mostrar más Leer menos
Institución
WGU D489 Cybersecurity Management
Grado
WGU D489 Cybersecurity Management











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU D489 Cybersecurity Management
Grado
WGU D489 Cybersecurity Management

Información del documento

Subido en
16 de enero de 2026
Número de páginas
35
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU D489 Cybersecurity Management Final Exam 2025/2026 – Latest
Questions & Answers| Questions & Answers| Grade A+| 100% Correct (Verified
Solutions)-


Question 1
A Chief Information Security Officer (CISO) is presenting a new security strategy to the
Board of Directors. To ensure the board approves the budget, what is the most important
factor the CISO should demonstrate?
A) The technical specifications of the new firewalls.
B) How the security strategy aligns with and supports the organization's business goals.
C) The number of attacks blocked in the last month.
D) The specific NIST controls that will be implemented.
E) The cost of the software compared to competitors.
Correct Answer: B) How the security strategy aligns with and supports the organization's
business goals.
Rationale: In Cybersecurity Management, strategic alignment is paramount. Executives care
about business value, revenue protection, and risk reduction. Technical details (A, D) and
operational metrics (C) are less effective at the board level than demonstrating how security
enables the business to succeed.

Question 2
An organization has identified a risk where a server failure could cost $10,000 in lost
business. This failure is expected to happen once every 4 years. What is the Annualized
Loss Expectancy (ALE)?
A) $2,500
B) $10,000
C) $40,000
D) $2,000
E) $5,000
Correct Answer: A) $2,500
Rationale: ALE is calculated as Single Loss Expectancy (SLE) × Annualized Rate of
Occurrence (ARO).

• SLE = $10,000.

• ARO = 1 time / 4 years = 0.25.

• 10,000 × 0.25 =∗∗

2,500**.

Question 3
Which document specifically identifies critical business functions and calculates the

, 2



maximum tolerable downtime (MTD) for each?
A) Threat Assessment
B) Business Impact Analysis (BIA)
C) Incident Response Plan (IRP)
D) Vulnerability Scan Report
E) Service Level Agreement (SLA)

Correct Answer: B) Business Impact Analysis (BIA)
Rationale: The Business Impact Analysis (BIA) is the process used to determine the criticality
of business activities and associated resource requirements to ensure operational resilience. It
defines RTO, RPO, and MTD. The IRP (C) handles the response, but the BIA provides the data
to prioritize that response.

Question 4
A global company is updating its privacy policy to comply with GDPR. Which of the
following is a core requirement regarding data retention under GDPR?
A) Data must be kept indefinitely for historical analysis.
B) Data must be encrypted using only symmetric keys.
C) Data should not be kept longer than is necessary for the purposes for which it is processed.
D) Data must be stored on servers located within the US.
E) Data must be backed up to tape daily.

Correct Answer: C) Data should not be kept longer than is necessary for the purposes for
which it is processed.
Rationale: This is the principle of Storage Limitation. GDPR mandates that personal data must
not be retained once the original purpose for collection has been fulfilled, unless required by
other laws (e.g., tax records).
Question 5
During a security incident, the response team discovers an active malware infection on a
critical server. According to the PICERL (Preparation, Identification, Containment,
Eradication, Recovery, Lessons Learned) model, what should be the IMMEDIATE next
step?
A) Restore the server from backups.
B) Format the hard drive.
C) Contain the incident to prevent spread (e.g., disconnect from network).
D) Write a report for management.
E) Identifying the hacker's location.

Correct Answer: C) Contain the incident to prevent spread (e.g., disconnect from network).
Rationale: After Identification comes Containment. Before you fix the issue (Eradication) or

, 3



restore data (Recovery), you must stop the bleeding. If you try to restore while the virus is active,
the backup will just get infected.

Question 6
Management decides to purchase a cyber-insurance policy to cover potential financial
losses from data breaches. How is this risk management strategy classified?
A) Risk Avoidance
B) Risk Mitigation
C) Risk Acceptance
D) Risk Transfer (Sharing)
E) Risk Deterrence
Correct Answer: D) Risk Transfer (Sharing)
Rationale: Risk Transfer involves shifting the financial burden of a risk to a third party (like an
insurance company). Mitigation would be installing a firewall; Avoidance would be not
collecting the data at all; Acceptance would be doing nothing and budgeting for the loss.

Question 7
Which U.S. regulation specifically mandates security and privacy protections for Protected
Health Information (PHI)?
A) SOX (Sarbanes-Oxley)
B) FERPA
C) HIPAA
D) PCI DSS
E) GLBA (Gramm-Leach-Bliley Act)

Correct Answer: C) HIPAA
Rationale: The Health Insurance Portability and Accountability Act (HIPAA) governs the
security and privacy of medical records and other personal health information. SOX is for
corporate finance; FERPA is for education; PCI DSS is for credit cards; GLBA is for financial
institutions.

Question 8
A security manager is defining a "Standard" for password creation. How does a Standard
differ from a Guideline?
A) Standards are optional; Guidelines are mandatory.
B) Standards are mandatory; Guidelines are optional recommendations.
C) Standards are high-level goals; Guidelines are step-by-step instructions.
D) There is no difference.
E) Standards are external laws; Guidelines are internal.

, 4



Correct Answer: B) Standards are mandatory; Guidelines are optional recommendations.
Rationale: In the governance hierarchy: Policies are high-level requirements
(mandatory). Standards are specific metrics or rules (mandatory, e.g., "Passwords must be 12
chars"). Guidelines are advice or best practices (optional). Procedures are step-by-step
instructions.

Question 9
Which NIST Cybersecurity Framework (CSF) function involves the implementation of
safeguards to ensure delivery of critical infrastructure services (e.g., Access Control,
Awareness Training)?
A) Identify
B) Protect
C) Detect
D) Respond
E) Recover

Correct Answer: B) Protect
Rationale: The Protect function outlines appropriate safeguards to ensure delivery of critical
infrastructure services. It limits or contains the impact of a potential cybersecurity event.
Examples include Identity Management, Access Control, Awareness and Training, and Data
Security.

Question 10
An organization adopts a "Defense in Depth" strategy. Which of the following best
describes this approach?
A) Relying solely on a very strong perimeter firewall.
B) Using a single vendor for all security products to ensure compatibility.
C) Layering multiple security controls (physical, technical, administrative) so that if one fails,
another catches the threat.
D) Hiring former hackers to test the network.
E) Placing all servers in the cloud.

Correct Answer: C) Layering multiple security controls (physical, technical,
administrative) so that if one fails, another catches the threat.
Rationale: Defense in Depth (or layered security) ensures that there is no single point of failure.
It combines controls like firewalls, IDS, encryption, policies, and guards.

Question 11
When conducting a quantitative risk assessment, what does the "Exposure Factor" (EF)
represent?
A) The probability of the risk occurring.
B) The total value of the asset.
$21.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
DoctorGriffin Maryland University
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2798
Miembro desde
5 meses
Número de seguidores
17
Documentos
1331
Última venta
20 horas hace

4.9

183 reseñas

5
167
4
15
3
0
2
0
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes