100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D488 – Cybersecurity Architecture & Engineering (2025/2026) | Complete Study Guide with Verified Questions & Accurate Answers

Rating
-
Sold
-
Pages
57
Grade
A+
Uploaded on
04-09-2025
Written in
2025/2026

WGU D488 – Cybersecurity Architecture & Engineering (2025/2026) | Complete Study Guide with Verified Questions & Accurate Answers

Institution
WGU D488 – Cybersecurity Architecture & Engineerin
Course
WGU D488 – Cybersecurity Architecture & Engineerin











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D488 – Cybersecurity Architecture & Engineerin
Course
WGU D488 – Cybersecurity Architecture & Engineerin

Document information

Uploaded on
September 4, 2025
Number of pages
57
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D488 – Cybersecurity Architecture &
Engineering (2025/2026) | Complete Study Guide
with Verified Questions & Accurate Answers


1. What is the term used to describe the assessment of whether a vendor will
remain in business?

Vendor viability

Source code escrow

Vendor lock-in

Vendor lockout

2. Devon is using an IaaS environment and would like to provision storage that
will be used as a disk attached to a server instance. What type of storage
should he use?

Archival storage

Object storage

Block storage

Database storage

3. If a company is implementing a new security policy that requires only
approved applications to run on employee workstations, which security
measure should they implement?

Block list

,Immutable system

Allow list

Antivirus software

,4. Bob has a key employee in a critical IT position. He is worried about the
possibility of the employee committing undetected fraud. Which of the
following is the best personnel security control he can implement to
control this?

mandatory vacation

need-to-know

Separation of duties

Least privilege

5. Describe how an allow list differs from a block list in terms of system
security.

An allow list is used for detecting malware, whereas a block list is for
system configuration.

An allow list is unchangeable, while a block list can be modified at
any time.

An allow list is a type of antivirus, while a block list is a method of
system auditing.

An allow list specifies which programs are permitted to run, while
a block list specifies which programs are not allowed.

6. A security architect is reviewing password compliance within the
organization. Which NIST standard can the security architect refer to for
password compliance?

NIST 800-84

NIST 800-53

NIST 800-207

, NIST 800-63

7. If a company experiences a data breach due to a compromised key and
lacks a key rotation policy, what immediate action should they take to
mitigate the risk?

Increase the number of keys

Implement a key rotation policy

Ignore the breach

Store keys in a public repository

8. If a company experiences repeated attacks from a specific IP address, what
action should be taken using firewall rules?

Block the specific IP address

Ignore the IP address as it may not be a threat

Allow the IP address to access the network

Increase bandwidth to accommodate more traffic

9. If a military unit needs to establish a data center quickly in a foreign country
with minimal setup and flexibility, which type of site should they choose and
why?

Cold site, because it is the least expensive option available.

Hot site, because it ensures no service disruption during operations.

Mobile site, because it offers flexibility and is designed for quick
deployment.

Warm site, because it provides a balance between cost and
operational capability.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
YANCHY Herzing University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1739
Member since
3 year
Number of followers
1159
Documents
23169
Last sold
1 week ago
Ace Your Exams with Elite Study Resources | ExamEliteHub on Stuvia

I offer genuine and dependable exam papers that are directly obtained from well-known, reputable institutions as a highly regarded professional who specializes in sourcing study materials. These papers are invaluable resources made to help people who want to become nurses and people who work in other fields prepare for exams. Because of my extensive experience and in-depth knowledge of the subject, I take great care to ensure that each exam paper meets the highest quality, accuracy, and relevance standards, making them an essential component of any successful study plan.

Read more Read less
4.1

447 reviews

5
251
4
58
3
85
2
18
1
35

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions