Questions and Correct Answers/ D488 Objective
Assessment Test Bank/ D488 Cybersecurity
Architecture And Engineering OA
A helpdesk administrator is implementing encryption for data at rest for their
Enterprise Windows clients. Which of the following is a common solution?
A. TLS (Transport Layer Security)
B. BitLocker
C. IPSec (Internet Protocol Security)
D. Software Guard Extensions
B. BitLocker
What is the purpose of a general purpose certificate?
A. To allow the use of the certificate for any number of subdomains
B. To prove ownership of a particular domain through email or a text record on the
domain
C. To ensure legal identity is verified
D. To check control over multiple domains
B. To prove ownership of a particular domain through email or a text record on the
domain
Which block cipher mode of operation is resistant to ciphertext manipulation
attacks by the previous ciphertext block with the current plaintext block
before encryption?
Cipher block chaining (CBC)
Which authenticated encryption mode of operation uses a one-time key and a
function to provide strong message authentication and is designed to be fast?
Poly1305
pg. 1
,Which statement describes the role of risk tolerance in the development of a
financial services company's mobile application for managing customer
accounts and on-the-go transactions?
Risk tolerance helps the company determine the acceptable level of risk for the
mobile application based on its potential impact on the company and its customers.
Which security control will secure a web-based credit monitoring service and
protect credit information of consumers in compliance with Fair Credit
Reporting Act (FCRA) requirements?
Access controls
A company is planning to update its disaster recovery plan to ensure that it
meets the latest regulations on securing personally identifiable information
(PII). What is the term used to describe the process of identifying and
evaluating the effect that the updated plan will have on the company's
operations and stakeholders?
Privacy Impact Assessment (PIA)
Which solution is commonly used on Microsoft Windows computers to protect
data at rest?
A. TLS (Transport Layer Security)
B. BitLocker
C. IPSec (Internet Protocol Security)
D. Software Guard Extensions (SGX)
B. BitLocker
Which method can be used to protect data at rest on Microsoft Windows
computers?
A. TLS (Transport Layer Security)
B. BitLocker
C. IPSec (Internet Protocol Security)
D. Software Guard Extensions (SGX)
B. BitLocker
pg. 2
,What type of encryption is used to protect data in transit, such as website traffic
and remote access traffic?
A. BitLocker
B. AES (Advanced Encryption Standard)
C. TLS (Transport Layer Security)
D. Software Guard Extensions (SGX)
C. TLS (Transport Layer Security)
What is an example of a method used to protect data in motion, which describes
the state when a system moves data?
A. BitLocker
B. TLS (Transport Layer Security)
C. IPSec (Internet Protocol Security)
D. Software Guard Extensions (SGX)
B. TLS (Transport Layer Security)
Which encryption mechanism is specifically designed to protect data as it exists in
memory, preventing untrusted processes from decoding it?
A. IPSec (Internet Protocol Security)
B. BitLocker
C. Software Guard Extensions (SGX)
D. TLS (Transport Layer Security)
C. Software Guard Extensions (SGX)
Which trusted execution environment (TEE) mechanism can encrypt data as it
exists in memory, preventing untrusted processes from decoding the information?
A. TLS (Transport Layer Security)
B. BitLocker
C. Software Guard Extensions (SGX)
D. IPSec (Internet Protocol Security)
C. Software Guard Extensions (SGX)
pg. 3
, Which protocol is commonly used to protect data in motion across networks, such
as cloud-synchronized data?
A. AES (Advanced Encryption Standard)
B. IPSec (Internet Protocol Security)
C. BitLocker
D. Software Guard Extensions (SGX)
B. IPSec (Internet Protocol Security)
Which method is used to protect data in transit, including website traffic, remote
access traffic, and data synchronized between cloud repositories?
A. BitLocker
B. AES (Advanced Encryption Standard)
C. IPSec (Internet Protocol Security)
D. Software Guard Extensions (SGX)
C. IPSec (Internet Protocol Security)
What is a common method used to protect data at rest using encryption, often seen
in Microsoft environments?
A. BitLocker
B. TLS (Transport Layer Security)
C. IPSec (Internet Protocol Security)
D. AES (Advanced Encryption Standard)
A. BitLocker
What encryption method is used on Microsoft Windows computers to protect data
at rest, and uses Advanced Encryption Standard (AES)?
A. IPSec (Internet Protocol Security)
B. TLS (Transport Layer Security)
C. Software Guard Extensions (SGX)
D. BitLocker
D. BitLocker
pg. 4