Engineering Final Exam Test | 2025 Complete
D488 Cybersecurity Architecture and
Engineering Actual Exam with Correct Verified
Answers | Already Graded A+ Exam
An IT security team has been notified that external contractors are
using their personal laptops to gain access to the corporate network.
The team needs to recommend a solution that will prevent unapproved
devices from accessing the network.
Which solution fulfills these requirements?
A) Implementing a demilitarized zone (DMZ)
B) Installing a hardware security module
C) Implementing port security
D) Deploying a software firewall
C) Implementing port security
Which method allows a process to check if a certificate is still valid by
referencing a list of revoked and suspended certificates?
,A. RA (Registration Authority)
B. OCSP (Online Certificate Status Protocol)
C. CRL (Certificate Revocation List)
D. CSR (Certificate Signing Request)
C. CRL (Certificate Revocation List)
A software developer needs to be able to run various versions of
Android on an x86 system. Which virtualization technology will allow
the software developer to perform this?
A. VDI (Virtual Desktop Infrastructure)
B. Emulation
C. Application virtualization
D. VMM (Virtual Machine Monitor)
B. Emulation
Which protocol provides a more efficient way to check the status of a
certificate without returning the entire certificate revocation list (CRL)?
A. OCSP (Online Certificate Status Protocol)
B. RA (Registration Authority)
,C. CRL (Certificate Revocation List)
D. CSR (Certificate Signing Request)
A. OCSP (Online Certificate Status Protocol)
Which protocol enables a server to communicate the status of a
requested certificate without returning an entire list?
A. CRL (Certificate Revocation List)
B. RA (Registration Authority)
C. OCSP (Online Certificate Status Protocol)
D. CSR (Certificate Signing Request)
C. OCSP (Online Certificate Status Protocol)
What role does a registration authority (RA) play in the certificate
process?
A. It checks the certificate status using OCSP
B. It maintains a list of revoked certificates
C. It accepts requests for digital certificates and validates the requestor
D. It generates certificate signing requests
, C. It accepts requests for digital certificates and performs various
additional steps to validate the requestor has the authorization to do
so.
What is a certificate signing request (CSR), and what information does it
contain?
A. It is a list of revoked certificates
B. It is a request generated on the device needing the certificate,
containing necessary information for certificate creation
C. It is a protocol that checks certificate status
D. It is a registration authority validating certificate requests
B. It is a request generated on the device needing the certificate,
containing necessary information for certificate creation
The chief technology officer for a small publishing company has been
tasked with improving the company's security posture. As part of a
network upgrade, the company has decided to implement intrusion
detection, spam filtering, content filtering, and antivirus controls. The
project needs to be completed using the least amount of infrastructure
while meeting all requirements.