100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D488 Cybersecurity Architecture and Engineering Oa Exam Questions and Answers Latest 2025/2026 Prep Test (Wgu D488 Objective Assessment 60 Exam Questions and Correct Answers)

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
03-03-2025
Written in
2024/2025

WGU D488 Cybersecurity Architecture and Engineering Oa Exam Questions and Answers Latest 2025/2026 Prep Test (Wgu D488 Objective Assessment 60 Exam Questions and Correct Answers)

Institution
WGU D488 Cybersecurity Architecture And Engineerin
Course
WGU D488 Cybersecurity Architecture and Engineerin









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D488 Cybersecurity Architecture and Engineerin
Course
WGU D488 Cybersecurity Architecture and Engineerin

Document information

Uploaded on
March 3, 2025
Number of pages
9
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D488 Cybersecurity Architecture and Engineering Oa
Exam Questions and Answers Latest 2025/2026 Prep Test
(Wgu D488 Objective Assessment 60 Exam Questions and
Correct Answers)
1. The security team recently enabled public access to a web application hosted on a server
inside the corporate network. The developers of the application report that the server has
received several structured query language (SQL) injection attacks in the past several days. The
team needs to deploy a solution that will block the SQL injection attacks. Which solution fulfills
these requirements?
Web application firewall (WAF)
2. An IT security team has been notified that external contractors are using their personal laptops
to gain access to the corporate network. The team needs to recommend a solution that will
prevent unapproved devices from accessing the network. Which solution fulfills these
requirements? Implementing port security
3. The chief technology officer for a small publishing company has been tasked with improving
the company's security posture. As part of a network upgrade, the company has decided to
implement intrusion detection, spam filtering, content filtering, and antivirus controls. The
project needs to be completed using the least amount of infrastructure while meeting all
requirements. Which solution fulfills these requirements?
Deploying a unified threat management (UTM) appliance
4. The security team plans to deploy an intrusion detection system (IDS) solution to alert
engineers about inbound threats. The team already has a database of signatures that they want the
IDS solution to validate. Which detection technique meets the requirements?
Signature-based detection
5. An IT organization had a security breach after deploying an update to its production web
servers. The application currently goes through a manual update process a few times per year.
The security team needs to recommend a failback option for future deployments. Which solution
fulfills these requirements?
Implementing versioning
6. A software development team is working on a new mobile application that will be used by
customers. The security team must ensure that builds of the application will be trusted by a
variety of mobile devices. Which solution fulfills these requirements?
Code signing




1|Page

, 7. An IT organization recently suffered a data leak incident. Management has asked the security
team to implement a print blocking mechanism for all documents stored on a corporate file share.
Which solution fulfills these requirements?
Digital rights management (DRM)
8. A company has recently discovered that a competitor is distributing copyrighted videos
produced by the in-house marketing team. Management has asked the security team to prevent
these types of violations in the future. Which solution fulfills these requirements?
Digital rights
9. A security team has been tasked with performing regular vulnerability scans for a cloud-based
infrastructure. How should these vulnerability scans be conducted when implementing zero trust
security?
Automatically
10. A healthcare company needs to ensure that medical researchers cannot inadvertently share
protected health information (PHI) data from medical records. What is the best solution?
Anonymization
11. A security team has been tasked with mitigating the risk of stolen credentials after a recent
breach. The solution must isolate the use of privileged accounts. In the future, administrators
must request access to mission-critical services before they can perform their tasks. What is the
best solution?
Privileged access management (PAM)
12. A global manufacturing company is moving its applications to the cloud. The security team
has been tasked with hardening the access controls for a corporate web application that was
recently migrated. End users should be granted access to different features based on their
locations and departments. Which access control solution should be implemented?
Attribute-based access control (ABAC)
13. A team of developers is building a new corporate web application. The security team has
stated that the application must authenticate users through two separate channels of
communication. Which type of authentication method should the developers include when
building the application?
- Out-of-band authentication
14. An IT organization is implementing a hybrid cloud deployment. Users should be able to sign
in to all corporate resources using their email addresses as their usernames, regardless of whether
they are accessing an application on-premises or in the cloud. Which solution meets this
requirement?
Single sign-on (SSO)

2|Page

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
DynamicNurse Chamberlain College Of Nursng
View profile
Follow You need to be logged in order to follow users or courses
Sold
3628
Member since
4 year
Number of followers
2908
Documents
1593
Last sold
8 hours ago

4.0

527 reviews

5
293
4
80
3
64
2
24
1
66

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions