100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

D488 CYBERSECURITY ARCHITECTURE AND ENGINEERING (CASP+)

Rating
-
Sold
-
Pages
251
Grade
A+
Uploaded on
15-05-2025
Written in
2024/2025

"An organization is developing a new telemedicine platform to provide remote healthcare services to patients and has asked a cybersecurity analyst to help develop a risk management plan for the new platform. What is the correct sequence of steps in the risk management process in this scenario? A) Identify business assets, identify known vulnerabilities, identify threats, identify business impact, and identify risk response B) Identify known vulnerabilities, identify business assets, identify threats, identify business impact, and identify risk response C) Identify business impact, identify known vulnerabilities, identify business assets, identify threats, and identify risk response D) Identify known vulnerabilities, identify business impact, identify business assets, identify threats, and identify risk response - CORRECT ANSWER= A) Identify business assets, identify known vulnerabilities, identify threats, identify business impact, and identify risk response" "A large financial institution has experienced a significant increase in phishing attacks targeting its employees. The institution is concerned about the potential financial and reputational damages caused by a successful phishing attack. Which security control will mitigate the risk of a successful phishing attack on the financial institution's employees? A) Conducting regular security awareness training for employees B) Implementing network segmentation to isolate sensitive data C) Enforcing strong password policies for all employees D) Installing antivirus software on all employee devices - CORRECT ANSWER= A) Conducting regular security awareness training for employees"

Show more Read less
Institution
D487
Course
D487

Content preview

D488 CYBERSECURITY
ARCHITECTURE AND
ENGINEERING (CASP+)
"An organization is developing a new telemedicine platform to provide remote healthcare
services to patients and has asked a cybersecurity analyst to help develop a risk management
plan for the new platform.

What is the correct sequence of steps in the risk management process in this scenario?

A) Identify business assets, identify known vulnerabilities, identify threats, identify business
impact, and identify risk response
B) Identify known vulnerabilities, identify business assets, identify threats, identify business
impact, and identify risk response
C) Identify business impact, identify known vulnerabilities, identify business assets, identify
threats, and identify risk response
D) Identify known vulnerabilities, identify business impact, identify business assets, identify
threats, and identify risk response - CORRECT ANSWER=> A) Identify business assets, identify
known vulnerabilities, identify threats, identify business impact, and identify risk response"

"A large financial institution has experienced a significant increase in phishing attacks targeting
its employees. The institution is concerned about the potential financial and reputational
damages caused by a successful phishing attack.

Which security control will mitigate the risk of a successful phishing attack on the financial
institution's employees?

A) Conducting regular security awareness training for employees

1|Page

,B) Implementing network segmentation to isolate sensitive data
C) Enforcing strong password policies for all employees
D) Installing antivirus software on all employee devices - CORRECT ANSWER=> A) Conducting
regular security awareness training for employees"

"A marketing agency has discovered a known vulnerability in its web content management
system. The system contains a large number of obsolete and insecure snapshots of virtual
machines, which can potentially be exploited by attackers to compromise the web content
management system. The agency has decided to implement hardening techniques and endpoint
security controls to mitigate the risk.

Which technique will meet the needs of this agency?

A) Removing outdated and unsecured images and templates
B) Implementing a web application firewall to monitor incoming traffic
C) Enforcing strict access control policies for all users
D) Conducting regular penetration testing to identify potential vulnerabilities - CORRECT
ANSWER=> A) Removing outdated and unsecured images and templates"


"A manufacturing company is concerned about the potential risks associated with firmware
attacks on its industrial control systems. The company has decided to implement hardening
techniques and endpoint security controls to mitigate the risk.

Which hardening technique will meet the needs of the company?

A) Regularly updating and securing firmware
B) Enforcing strict access control policies for all users
C) Implementing a host-based intrusion detection and prevention system
D) Conducting regular security awareness training for employees - CORRECT ANSWER=> A)
Regularly updating and securing firmware"

"A financial institution is concerned about the potential risks associated with unauthorized
access to sensitive data on its servers. The company has decided to implement hardening
techniques and endpoint security controls to mitigate the risk.

Which technique will provide a secure operating system with access controls for user
applications?



2|Page

,A) SELinux
B) Multifactor authentication (MFA) for user accounts
C) Regular vulnerability assessments and penetration testing
D) Windows 10 - CORRECT ANSWER=> A) SELinux"

"A company is concerned about the security of its network and wants to implement a control
that will allow only preapproved software to run on its endpoints.

Which control should the company implement to achieve this goal?

A) Allowlisting
B) Blacklisting
C) Encryption
D) Multifactor authentication - CORRECT ANSWER=> A) Allowlisting"

"A company is concerned about the potential risks associated with unauthorized access to its
cloud infrastructure. The company has decided to implement security controls to mitigate the
risk.

Which actions can ensure the integrity and authenticity of the cloud infrastructure and
applications?

A) Implementing attestation services
B) Implementing a load balancer to distribute traffic
C) Conducting regular vulnerability assessments and penetration testing
D) Using a web application firewall - CORRECT ANSWER=> A) Implementing attestation services"

"A company is looking to protect sensitive data stored on its storage devices and ensure that
this data is secure from unauthorized access. The company is looking for a solution that
provides a high level of security and protection for its data.

Which security technology will protect sensitive data stored on the company's storage devices
by automatically initiating security procedures as they are written to the device?

A) Self-encrypting drives
B) Hardware security module (HSM)
C) Two-factor authentication
D) Measured boot - CORRECT ANSWER=> A) Self-encrypting drives"

3|Page

, "A company is concerned about advanced persistent threats and targeted attacks on its
computer systems. The company wants to implement a security solution that can detect and
respond to any suspicious activity on its systems.

Which security technology meets the needs of this company?

A) Endpoint detection and response (EDR) software
B) Hardware security module (HSM)
C) Two-factor authentication
D) Antivirus tools - CORRECT ANSWER=> A) Endpoint detection and response (EDR) software"

"An enterprise is deploying a new software application that requires a cryptographic protocol to
secure data transmission. The application will be used to process sensitive customer
information, and the company wants to ensure that the data is protected during transmission.

Which cryptographic protocol meets the needs of the enterprise?

A) Transport Layer Security (TLS) with Advanced Encryption Standard (AES)
B) Secure Sockets Layer (SSL) with Data Encryption Standard (DES)
C) Point-to-Point Tunneling Protocol (PPTP) with Triple Data Encryption Standard (3DES)
D) Hypertext Transfer Protocol Secure (HTTPS) with Rivest-Shamir-Adleman (RSA) - CORRECT
ANSWER=> A) Transport Layer Security (TLS) with Advanced Encryption Standard (AES)"


"Which emerging technology has the potential to significantly impact the security of current
encryption methods by making it possible to quickly solve mathematical problems that are
currently considered difficult or impossible to solve?

A) Quantum computing
B) Blockchain
C) Artificial intelligence (AI)
D) Augmented reality (AR) - CORRECT ANSWER=> A) Quantum computing"

"Which public-key cryptosystem uses prime factorization as the basis for its security?

A) Rivest-Shamir-Adleman (RSA)
B) Digital Signature Algorithm (DSA)
C) Elliptic Curve Digital Signature Algorithm (ECDSA)

4|Page

Written for

Institution
D487
Course
D487

Document information

Uploaded on
May 15, 2025
Number of pages
251
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ExcelHub Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
29
Member since
1 year
Number of followers
0
Documents
1078
Last sold
1 month ago
Excel-Hub YOUR TRUSTED HUB FOR EXCEPTIONAL STUDY RESOURCES!

Welcome to Excel-Hub your go-to source for high-quality test banks and study materials designed to help you excel academically. I offer a comprehensive range of resources including test banks, solution manuals, and other study materials, all meticulously curated to ensure accuracy and effectiveness. They are affordable, well discounted especially the package deals and instantly available, making your learning experience seamless and efficient. Trust Excel-Hub to be your partner in academic success, providing the tools you need to achieve your educational goals. I understand the importance of high-quality, dependable materials in your academic journey. That’s why every document in my store is thoughtfully created to meet your specific needs, ensuring you have the tools to succeed with confidence. Be sure to Excel! I’d love to hear about your experience! Please leave a review of your experience with the study documents.

Read more Read less
4.0

3 reviews

5
1
4
1
3
1
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions