Bank 2 With 360 Real Exam Questions And Correct
Answers/ Wgu D488 Cybersecurity Architecture And
Engineering OA/ D488 OA Prep Test Bank 2
A software developer needs to be able to run various versions of Android on an
x86 system. Which virtualization technology will allow the software developer to
perform this?
A. VDI (Virtual Desktop Infrastructure)
B. Emulation
C. Application virtualization
D. VMM (Virtual Machine Monitor)
B. Emulation
A Linux administrator is configuring ModSecurity for Apache servers. Which type
of attacks should the administrator set rule configurations? (Select all that apply.)
1. File inclusion
2. Geoblocking
3. Directory traversal
4. Cleartext protocols
A) 1, 2
B) 1, 3
C) 1, 4
D) 2, 4
B) 1, 3
Which device provides foundational protection for a network by blocking or
allowing traffic based on pre-configured rules?
A. Firewall
B. Router
pg. 1
,C. Load balancer
D. NAT gateway
A. Firewall
What type of web application firewall is commonly used with Apache servers to
help defend against application layer attacks?
A. NAT gateway
B. ModSecurity
C. Geoblocking
D. Traditional firewall
B. ModSecurity
Which virtualization technology allows an x86 computer to run the Android OS or
software designed for systems like Nintendo or Xbox?
A. VDI (Virtual Desktop Infrastructure)
B. Emulation
C. Application Virtualization
D. VMM (Virtual Machine Monitor)
B. Emulation
What technology uses a virtual machine to provision corporate desktops, often
replacing typical desktop computers with low-spec thin clients?
A. Application Virtualization
B. VMM (Virtual Machine Monitor)
C. VDI (Virtual Desktop Infrastructure)
D. Emulation
C. VDI (Virtual Desktop Infrastructure)
Which technology allows the client to either access an application hosted on a
server or stream the application for local processing?
A. VMM (Virtual Machine Monitor)
B. Emulation
pg. 2
,C. Application Virtualization
D. VDI (Virtual Desktop Infrastructure)
C. Application Virtualization
Which type of environment is designed to be used by visitors, such as the public or
vendors?
A. Guest environment
B. Peer-to-peer
C. Air gap
D. Jump box
A. Guest environment
Which of the following refers to a decentralized network where participating nodes
self-organize to provide services typically found in client-server networks?
A. Guest environment
B. Peer-to-peer
C. Jump box
D. Air gap
B. Peer-to-peer
Which security design would be most appropriate for protecting a high-value asset
in a sensitive facility, such as a nuclear power plant, by isolating it from any
network?
A. Peer-to-peer
B. Jump box
C. Air gap
D. Guest environment
C. Air gap
A security architect is designing a strategy to help continue operating in the face of
a cyber-attack. Which of the following will help to accomplish this objective?
(Select all that apply.)
1. Heterogeneity
pg. 3
, 2. Clustering
3. COA development
4. Migrating to the cloud
A) 1, 2, 3
B) 1, 2, 4
C) 1, 3, 4
D) 2, 3, 4
A) 1, 2, 3
Which strategy involves using diverse, non-similar components to create a barrier
that complicates an adversary's attempts to infiltrate before detection?
A. Clustering
B. COA development
C. Heterogeneity
D. Migrating to the cloud
C. Heterogeneity
Which approach involves multiple redundant processing nodes that share data and
accept connections to provide redundancy in case of failure?
A. COA development
B. Heterogeneity
C. Clustering
D. Migrating to the cloud
C. Clustering
What part of a resilience strategy involves preparing specific responses to potential
events, ensuring the organization is ready to act when necessary?
A. Clustering
B. Heterogeneity
C. COA development
D. Migrating to the cloud
C. COA development
pg. 4