Wgu d488 - cybersecurity architecture and
engineering (casp+) | verified 2025 test bank with
accurate answers− guaranteed pass
The security team recently enabled public access to a web application hosted on a server inside the
corporate network. The developers of the application report that the server has received several
structured query language (sql) injection attacks in the past several days. The team needs to deploy a
solution that will block the sql injection attacks.
Which solution fulfills these requirements?
A) virtual private network (vpn)
B) security information and event management (siem)
C) web application firewall (waf)
D) secure socket shell (ssh)
CORRECT ANS: c) web application firewall (waf)
An it security team has been notified that external contractors are using their personal laptops to gain
access to the corporate network. The team needs to recommend a solution that will prevent
unapproved devices from accessing the network.
Which solution fulfills these requirements?
A) implementing a demilitarized zone (dmz)
B) installing a hardware security module
C) implementing port security
D) deploying a software firewall
CORRECT ANS: c) implementing port security
, The chief technology officer for a small publishing company has been tasked with improving the
company's security posture. As part of a network upgrade, the company has decided to implement
intrusion detection, spam filtering, content filtering, and antivirus controls. The project needs to be
completed using the least amount of infrastructure while meeting all requirements.
Which solution fulfills these requirements?
A) deploying an anti-spam gateway
B) deploying a proxy server
C) deploying a unified threat management (utm) appliance
D) deploying a web application firewall (waf)
CORRECT ANS: c) deploying a unified threat management (utm) appliance
The security team plans to deploy an intrusion detection system (ids) solution to alert engineers about
inbound threats. The team already has a database of signatures that they want the ids solution to
validate.
Which detection technique meets the requirements?
A) intrusion detection
B) deep packet inspection
C) signature-based detection
D) intrusion prevention
CORRECT ANS: c) signature-based detection
An it organization had a security breach after deploying an update to its production web servers. The
application currently goes through a manual update process a few times per year. The security team
needs to recommend a failback option for future deployments.
engineering (casp+) | verified 2025 test bank with
accurate answers− guaranteed pass
The security team recently enabled public access to a web application hosted on a server inside the
corporate network. The developers of the application report that the server has received several
structured query language (sql) injection attacks in the past several days. The team needs to deploy a
solution that will block the sql injection attacks.
Which solution fulfills these requirements?
A) virtual private network (vpn)
B) security information and event management (siem)
C) web application firewall (waf)
D) secure socket shell (ssh)
CORRECT ANS: c) web application firewall (waf)
An it security team has been notified that external contractors are using their personal laptops to gain
access to the corporate network. The team needs to recommend a solution that will prevent
unapproved devices from accessing the network.
Which solution fulfills these requirements?
A) implementing a demilitarized zone (dmz)
B) installing a hardware security module
C) implementing port security
D) deploying a software firewall
CORRECT ANS: c) implementing port security
, The chief technology officer for a small publishing company has been tasked with improving the
company's security posture. As part of a network upgrade, the company has decided to implement
intrusion detection, spam filtering, content filtering, and antivirus controls. The project needs to be
completed using the least amount of infrastructure while meeting all requirements.
Which solution fulfills these requirements?
A) deploying an anti-spam gateway
B) deploying a proxy server
C) deploying a unified threat management (utm) appliance
D) deploying a web application firewall (waf)
CORRECT ANS: c) deploying a unified threat management (utm) appliance
The security team plans to deploy an intrusion detection system (ids) solution to alert engineers about
inbound threats. The team already has a database of signatures that they want the ids solution to
validate.
Which detection technique meets the requirements?
A) intrusion detection
B) deep packet inspection
C) signature-based detection
D) intrusion prevention
CORRECT ANS: c) signature-based detection
An it organization had a security breach after deploying an update to its production web servers. The
application currently goes through a manual update process a few times per year. The security team
needs to recommend a failback option for future deployments.