100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D488 Final Exam Test Bank (Latest 2025/ 2026 Update) Cybersecurity Architecture and Engineering| Questions & Answers| Grade A| 100% Correct (Verified Solutions)

Rating
5.0
(2)
Sold
7
Pages
255
Grade
A+
Uploaded on
15-02-2025
Written in
2024/2025

WGU D488 Final Exam Test Bank (Latest 2025/ 2026 Update) Cybersecurity Architecture and Engineering| Questions & Answers| Grade A| 100% Correct (Verified Solutions) QUESTION A company is looking to protect sensitive data stored on its storage devices and ensure that this data is secure from unauthorized access. The company is looking for a solution that provides a high level of security and protection for its data. Which security technology will protect sensitive data stored on the company's storage devices by automatically initiating security procedures as they are written to the device? A) Self-encrypting drives B) Hardware security module (HSM) C) Two-factor authentication D) Measured boot Answer: A) Self-encrypting drives QUESTION A company is concerned about advanced persistent threats and targeted attacks on its computer systems. The company wants to implement a security solution that can detect and respond to any suspicious activity on its systems. Which security technology meets the needs of this company? A) Endpoint detection and response (EDR) software B) Hardware security module (HSM) C) Two-factor authentication D) Antivirus tools Answer: A) Endpoint detection and response (EDR) software QUESTION An enterprise is deploying a new software application that requires a cryptographic protocol to secure data transmission. The application will be used to process sensitive customer information, and the company wants to ensure that the data is protected during transmission. Which cryptographic protocol meets the needs of the enterprise? A) Transport Layer Security (TLS) with Advanced Encryption Standard (AES) B) Secure Sockets Layer (SSL) with Data Encryption Standard (DES) C) Point-to-Point Tunneling Protocol (PPTP) with Triple Data Encryption Standard (3DES) D) Hypertext Transfer Protocol Secure (HTTPS) with Rivest-Shamir-Adleman (RSA) Answer: A) Transport Layer Security (TLS) with Advanced Encryption Standard (AES) QUESTION Which emerging technology has the potential to significantly impact the security of current encryption methods by making it possible to quickly solve mathematical problems that are currently considered difficult or impossible to solve? A) Quantum computing B) Blockchain C) Artificial intelligence (AI) D) Augmented reality (AR) Answer: A) Quantum computing QUESTION Which public-key cryptosystem uses prime factorization as the basis for its security? A) Rivest-Shamir-Adleman (RSA) B) Digital Signature Algorithm (DSA) C) Elliptic Curve Digital Signature Algorithm (ECDSA) D) Diffie-Hellman (DH) Answer: A) Rivest-Shamir-Adleman (RSA) QUESTION The company plans to deploy a cryptographic system for their digital signatures, which employs a public key cryptosystem that is based on figures described by the equation y^2 = x^3 + ax + b. Which public-key cryptosystem does this describe? A) Elliptic Curve Digital Signature Algorithm (ECDSA) B) Rivest-Shamir-Adleman (RSA) C) Digital Signature Algorithm (DSA) D) Diffie-Hellman (DH) Answer: A) Elliptic Curve Digital Signature Algorithm (ECDSA) QUESTION Which key exchange algorithm is used to establish a shared secret key between two parties without the need for a pre-shared secret or public key exchange? A) Diffie-Hellman (DH) B) Rivest-Shamir-Adleman (RSA) C) Digital Signature Algorithm (DSA) D) Elliptic Curve Diffie-Hellman (ECDH) Answer: A) Diffie-Hellman (DH) QUESTION Which block cipher mode of operation is resistant to ciphertext manipulation attacks by the previous ciphertext block with the current plaintext block before encryption? A) Cipher block chaining (CBC) B) Electronic codebook (ECB) C) Output feedback (OFB) D) Counter (CTR) Answer: A) Cipher block chaining (CBC) QUESTION Which authenticated encryption mode of operation uses a one-time key and a function to provide strong message authentication and is designed to be fast? A) Poly1305 B) Cipher block chaining (CBC) C) Electronic codebook (ECB) D) Counter (CTR) Answer: A) Poly1305 QUESTION Which risk management strategy will ensure the security of data stored on a software application? A) Encryption of all sensitive data stored within the application B) Installation of the latest antivirus software on all computers that access the application C) Configuration of the application to require strong, unique passwords for all user accounts D) Implementation of a strict firewall policy to restrict access to the application's server Answer: A) Encryption of all sensitive data stored within the application QUESTION Which risk management strategy will reduce the threat surface on a new web application? A) Use of hardening measures to remove unnecessary services, protocols, and applications B) Implementation of end-to-end encryption for all user data C) Configuration of the web application to disable all external device connections on all workstations D) Implementation of regular virus scanning for all workstations Answer: A) Use of hardening measures to remove unnecessary services, protocols, and applications QUESTION Which statement describes the role of risk tolerance in the development of a financial services company's mobile application for managing customer accounts and on-the-go transactions? A) Risk tolerance helps the company determine the acceptable level of risk for the mobile application based on its potential impact on the company and its customers. B) Risk tolerance determines the specific security controls that must be implemented in the mobile application. C) Risk tolerance ensures that the company's development team is trained in cybersecurity best practices. D) Risk tolerance guides the decision-making process regarding the trade-off between the level of innovation and the level of risk in the mobile application. Answer: A) Risk tolerance helps the company determine the acceptable level of risk for the mobile application based on its potential impact on the company and its customers. QUESTION A software company uses a structured query language (SQL) database to store customer data, such as names, addresses, and credit card information. The IT security team has identified several potential vulnerabilities that could result in a data breach, including SQL injection attacks and weak authentication controls. Which risk management strategy can reduce the risk of a data breach? A) Enforcing strong authentication controls and limiting access to the SQL database to help prevent unauthorized access B) Encrypting sensitive customer information stored in the SQL database to help prevent unauthorized access C) Implementing intrusion detection and prevention systems to help detect and prevent unauthorized access to the SQL database D) Regularly scanning the SQL database for vulnerabilities and taking action to remediate them Answer: A) Enforcing strong authentication controls and limiting access to the SQL database to help prevent unauthorized access QUESTION A retail company is required to comply with the Payment Card Industry Data Security Standard (PCI DSS), which establishes security requirements for companies that process, store, or transmit credit card information. The company is planning to integrate wireless networks into its stores to provide free Wi-Fi to customers. Which Wi-Fi encryption standard will meet the needs of the company? A) WPA2 with Advanced Encryption Standard (AES) encryption B) WPA with Temporal Key Integrity Protocol (TKIP) encryption C) WEP encryption D) Open network Answer: A) WPA2 with Advanced Encryption Standard (AES) encryption QUESTION A European Union (EU) company is required to comply with the General Data Protection Regulation (GDPR), which sets requirements for the protection of personal data for EU residents. Which security control will secure web applications and protect personal data of EU residents in compliance with the General Data Protection Regulation (GDPR)? A) Encryption B) Authentication and authorization C) Input validation D) Security monitoring Answer: A) Encryption QUESTION Which security control will secure a web-based credit monitoring service and protect credit information of consumers in compliance with Fair Credit Reporting Act (FCRA) requirements? A) Access controls B) Penetration testing C) Input validation D) Secure coding practices Answer: A) Access controls QUESTION A financial institution is required to comply with the Payment Card Industry Data Security Standard (PCI DSS), which sets requirements for the protection of payment card data. The institution uses various software programs and utilities to manage payment card data, and it is essential to ensure that only authorized programs and utilities are allowed on the institution's systems. Which security control will meet the needs of the institution? A) Application allowlisting B) Password policies

Show more Read less











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
February 15, 2025
File latest updated on
February 15, 2025
Number of pages
255
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • wgu d488 final exam test

Content preview

WGUl D488l Finall Examl Testl Bankl
(Latestl 2025/l 2026l Update)l Cybersecurityl
Architecturel andl Engineering|l Questionsl
&l Answers|l Gradel A|l 100%l Correctl
(Verifiedl Solutions)-l Galen

Q:l Al companyl isl lookingl tol protectl sensitivel datal storedl onl itsl storagel devicesl andl
ensurel thatl thisl datal isl securel froml unauthorizedl access.l Thel companyl isl lookingl forl al
solutionl thatl providesl al highl levell ofl securityl andl protectionl forl itsl data.
l l Whichl securityl technologyl willl protectl sensitivel datal storedl onl thel company'sl storagel
devicesl byl automaticallyl initiatingl securityl proceduresl asl theyl arel writtenl tol thel device?
A)l Self-encryptingl drives
B)l Hardwarel securityl modulel (HSM)
C)l Two-factorl authentication
D)l Measuredl boot
Answer:
A)l Self-encryptingl drives

Q:l Al companyl isl concernedl aboutl advancedl persistentl threatsl andl targetedl attacksl onl
itsl computerl systems.l Thel companyl wantsl tol implementl al securityl solutionl thatl canl
detectl andl respondl tol anyl suspiciousl activityl onl itsl systems.
l l Whichl securityl technologyl meetsl thel needsl ofl thisl company?
A)l Endpointl detectionl andl responsel (EDR)l software
B)l Hardwarel securityl modulel (HSM)
C)l Two-factorl authentication
D)l Antivirusl tools
Answer:
A)l Endpointl detectionl andl responsel (EDR)l software

Q:l Anl enterprisel isl deployingl al newl softwarel applicationl thatl requiresl al cryptographicl
protocoll tol securel datal transmission.l Thel applicationl willl bel usedl tol processl sensitivel
customerl information,l andl thel companyl wantsl tol ensurel thatl thel datal isl protectedl
duringl transmission.
l l Whichl cryptographicl protocoll meetsl thel needsl ofl thel enterprise?
A)l Transportl Layerl Securityl (TLS)l withl Advancedl Encryptionl Standardl (AES)
B)l Securel Socketsl Layerl (SSL)l withl Datal Encryptionl Standardl (DES)

,C)l Point-to-Pointl Tunnelingl Protocoll (PPTP)l withl Triplel Datal Encryptionl Standardl
(3DES)
D)l Hypertextl Transferl Protocoll Securel (HTTPS)l withl Rivest-Shamir-Adlemanl (RSA)
Answer:
A)l Transportl Layerl Securityl (TLS)l withl Advancedl Encryptionl Standardl (AES)

Q:l Whichl emergingl technologyl hasl thel potentiall tol significantlyl impactl thel securityl
ofl currentl encryptionl methodsl byl makingl itl possiblel tol quicklyl solvel mathematicall
problemsl thatl arel currentlyl consideredl difficultl orl impossiblel tol solve?
A)l Quantuml computing
B)l Blockchain
C)l Artificiall intelligencel (AI)
D)l Augmentedl realityl (AR)
Answer:
A)l Quantuml computing

Q:l Whichl public-keyl cryptosysteml usesl primel factorizationl asl thel basisl forl itsl
security?
A)l Rivest-Shamir-Adlemanl (RSA)
B)l Digitall Signaturel Algorithml (DSA)
C)l Ellipticl Curvel Digitall Signaturel Algorithml (ECDSA)
D)l Diffie-Hellmanl (DH)
Answer:
A)l Rivest-Shamir-Adlemanl (RSA)

Q:l Thel companyl plansl tol deployl al cryptographicl systeml forl theirl digitall signatures,l
whichl employsl al publicl keyl cryptosysteml thatl isl basedl onl figuresl describedl byl thel
equationl y^2l =l x^3l +l axl +l b.
l l Whichl public-keyl cryptosysteml doesl thisl describe?
A)l Ellipticl Curvel Digitall Signaturel Algorithml (ECDSA)
B)l Rivest-Shamir-Adlemanl (RSA)
C)l Digitall Signaturel Algorithml (DSA)
D)l Diffie-Hellmanl (DH)
Answer:
A)l Ellipticl Curvel Digitall Signaturel Algorithml (ECDSA)

Q:l Whichl keyl exchangel algorithml isl usedl tol establishl al sharedl secretl keyl betweenl
twol partiesl withoutl thel needl forl al pre-sharedl secretl orl publicl keyl exchange?
A)l Diffie-Hellmanl (DH)
B)l Rivest-Shamir-Adlemanl (RSA)
C)l Digitall Signaturel Algorithml (DSA)

,D)l Ellipticl Curvel Diffie-Hellmanl (ECDH)
Answer:
A)l Diffie-Hellmanl (DH)

Q:l Whichl blockl cipherl model ofl operationl isl resistantl tol ciphertextl manipulationl
attacksl byl thel previousl ciphertextl blockl withl thel currentl plaintextl blockl beforel
encryption?
A)l Cipherl blockl chainingl (CBC)
B)l Electronicl codebookl (ECB)
C)l Outputl feedbackl (OFB)
D)l Counterl (CTR)
Answer:
A)l Cipherl blockl chainingl (CBC)

Q:l Whichl authenticatedl encryptionl model ofl operationl usesl al one-timel keyl andl al
functionl tol providel strongl messagel authenticationl andl isl designedl tol bel fast?
A)l Poly1305
B)l Cipherl blockl chainingl (CBC)
C)l Electronicl codebookl (ECB)
D)l Counterl (CTR)
Answer:
A)l Poly1305

Q:l Whichl riskl managementl strategyl willl ensurel thel securityl ofl datal storedl onl al
softwarel application?
A)l Encryptionl ofl alll sensitivel datal storedl withinl thel application
B)l Installationl ofl thel latestl antivirusl softwarel onl alll computersl thatl accessl thel
application
C)l Configurationl ofl thel applicationl tol requirel strong,l uniquel passwordsl forl alll userl
accounts
D)l Implementationl ofl al strictl firewalll policyl tol restrictl accessl tol thel application'sl server
Answer:
A)l Encryptionl ofl alll sensitivel datal storedl withinl thel application

Q:l Whichl riskl managementl strategyl willl reducel thel threatl surfacel onl al newl webl
application?
A)l Usel ofl hardeningl measuresl tol removel unnecessaryl services,l protocols,l andl
applications
B)l Implementationl ofl end-to-endl encryptionl forl alll userl data
C)l Configurationl ofl thel webl applicationl tol disablel alll externall devicel connectionsl onl
alll workstations

, D)l Implementationl ofl regularl virusl scanningl forl alll workstations
Answer:
A)l Usel ofl hardeningl measuresl tol removel unnecessaryl services,l protocols,l andl
applications

Q:l Whichl statementl describesl thel rolel ofl riskl tolerancel inl thel developmentl ofl al
financiall servicesl company'sl mobilel applicationl forl managingl customerl accountsl andl on-
the-gol transactions?
A)l Riskl tolerancel helpsl thel companyl determinel thel acceptablel levell ofl riskl forl thel
mobilel applicationl basedl onl itsl potentiall impactl onl thel companyl andl itsl customers.
B)l Riskl tolerancel determinesl thel specificl securityl controlsl thatl mustl bel implementedl inl
thel mobilel application.
C)l Riskl tolerancel ensuresl thatl thel company'sl developmentl teaml isl trainedl inl
cybersecurityl bestl practices.
D)l Riskl tolerancel guidesl thel decision-makingl processl regardingl thel trade-offl betweenl
thel levell ofl innovationl andl thel levell ofl riskl inl thel mobilel application.
Answer:
A)l Riskl tolerancel helpsl thel companyl determinel thel acceptablel levell ofl riskl forl thel
mobilel applicationl basedl onl itsl potentiall impactl onl thel companyl andl itsl customers.

Q:l Al softwarel companyl usesl al structuredl queryl languagel (SQL)l databasel tol storel
customerl data,l suchl asl names,l addresses,l andl creditl cardl information.l Thel ITl securityl
teaml hasl identifiedl severall potentiall vulnerabilitiesl thatl couldl resultl inl al datal breach,l
includingl SQLl injectionl attacksl andl weakl authenticationl controls.l
l l Whichl riskl managementl strategyl canl reducel thel riskl ofl al datal breach?
A)l Enforcingl strongl authenticationl controlsl andl limitingl accessl tol thel SQLl databasel tol
helpl preventl unauthorizedl access
B)l Encryptingl sensitivel customerl informationl storedl inl thel SQLl databasel tol helpl
preventl unauthorizedl access
C)l Implementingl intrusionl detectionl andl preventionl systemsl tol helpl detectl andl preventl
unauthorizedl accessl tol thel SQLl database
D)l Regularlyl scanningl thel SQLl databasel forl vulnerabilitiesl andl takingl actionl tol
remediatel them
Answer:
A)l Enforcingl strongl authenticationl controlsl andl limitingl accessl tol thel SQLl databasel tol
helpl preventl unauthorizedl access

Q:l Al retaill companyl isl requiredl tol complyl withl thel Paymentl Cardl Industryl Datal
Securityl Standardl (PCIl DSS),l whichl establishesl securityl requirementsl forl companiesl thatl
process,l store,l orl transmitl creditl cardl information.l Thel companyl isl planningl tol integratel
wirelessl networksl intol itsl storesl tol providel freel Wi-Fil tol customers.
l l Whichl Wi-Fil encryptionl standardl willl meetl thel needsl ofl thel company?

Reviews from verified buyers

Showing all 2 reviews
4 months ago

I have been studying for this class for way to long and these questions have saved me so much stress and effort. I am excited to see the results.

6 months ago

5.0

2 reviews

5
2
4
0
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
nurse_steph Rasmussen College
View profile
Follow You need to be logged in order to follow users or courses
Sold
9335
Member since
5 year
Number of followers
5135
Documents
7547
Last sold
3 hours ago
Exams, Study guides, Reviews, Notes

All study solutions.

3.9

1671 reviews

5
841
4
296
3
258
2
76
1
200

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions