WGU D488 CybersecurityArchitectureand
Engineering Final Exam Test | 2025 Complete
D488 Cybersecurity Architecture andEngineering
Actual Exam withCorrect Verified Answers |
Already Graded A+ Exam
An IT security team has been notified that external contractors are using their
personal laptops to gain access to the corporate network.team
Theneedsto
recommenda solutionthatwill preventunapproved devices from accessing
the network.
Which solutionfulfills theserequirements?
A) Implementinga demilitarizedzone(DMZ)
B) Installing a hardwaresecuritymodule
C) Implementingportsecurity
D) Deployinga softwarefirewall
C) Implementingportsecurity
Which methodallowsa processto check if a certificateis still valid by
referencing a list of revoked and suspended certificates?
,A. RA (RegistrationAuthority)
B. OCSP (Online CertificateStatusProtocol)
C. CRL (CertificateRevocationList)
D. CSR (CertificateSigning Request)
C. CRL (CertificateRevocationList)
A software developer needs to be able to run various versions of Android
on
an x86 system.Which virtualizationtechnologywill allow the software
developer to perform this?
A. VDI (Virtual DesktopInfrastructure)
B. Emulation
C. Applicationvirtualization
D. VMM (Virtual MachineMonitor)
B. Emulation
Which protocol provides a more efficient way to check the status of a
certificatewithoutreturningtheentirecertificaterevocationlist (CRL)?
A. OCSP (Online CertificateStatusProtocol)
B. RA (RegistrationAuthority)
,C. CRL (CertificateRevocationList)
D. CSR (CertificateSigning Request)
A. OCSP (Online CertificateStatusProtocol)
Which protocolenablesa serverto communicatethestatusof a requested
certificate without returning an entire list?
A. CRL (CertificateRevocationList)
B. RA (RegistrationAuthority)
C. OCSP (Online CertificateStatusProtocol)
D. CSR (CertificateSigning Request)
C. OCSP (Online CertificateStatusProtocol)
What role doesa registrationauthority(RA) play in thecertificateprocess?
A. It checksthecertificatestatususing OCSP
B. It maintainsa list of revokedcertificates
C. It acceptsrequestsfor digital certificatesand validatestherequestor
D. It generatescertificatesigning requests
, C. It accepts requests for digital certificates and performs various additional
stepsto validatetherequestorhastheauthorizationto do so.
What is a certificatesigning request(CSR), and whatinformationdoesit
contain?
A. It is a list of revokedcertificates
B. It is a requestgeneratedon thedeviceneedingthecertificate, containing
necessary information for certificate creation
C. It is a protocolthatcheckscertificatestatus
D. It is a registrationauthorityvalidatingcertificaterequests
B. It is a requestgeneratedon thedeviceneedingthecertificate, containing
necessary information for certificate creation
The chief technology officer for a small publishing company has been tasked
with improving the company's security posture. As part of a network upgrade,
the company has decided to implement intrusion detection, spam filtering,
content filtering, and antivirus controls. The project
needsto be completed
using theleastamountof infrastructure while meeting all requirements.
Engineering Final Exam Test | 2025 Complete
D488 Cybersecurity Architecture andEngineering
Actual Exam withCorrect Verified Answers |
Already Graded A+ Exam
An IT security team has been notified that external contractors are using their
personal laptops to gain access to the corporate network.team
Theneedsto
recommenda solutionthatwill preventunapproved devices from accessing
the network.
Which solutionfulfills theserequirements?
A) Implementinga demilitarizedzone(DMZ)
B) Installing a hardwaresecuritymodule
C) Implementingportsecurity
D) Deployinga softwarefirewall
C) Implementingportsecurity
Which methodallowsa processto check if a certificateis still valid by
referencing a list of revoked and suspended certificates?
,A. RA (RegistrationAuthority)
B. OCSP (Online CertificateStatusProtocol)
C. CRL (CertificateRevocationList)
D. CSR (CertificateSigning Request)
C. CRL (CertificateRevocationList)
A software developer needs to be able to run various versions of Android
on
an x86 system.Which virtualizationtechnologywill allow the software
developer to perform this?
A. VDI (Virtual DesktopInfrastructure)
B. Emulation
C. Applicationvirtualization
D. VMM (Virtual MachineMonitor)
B. Emulation
Which protocol provides a more efficient way to check the status of a
certificatewithoutreturningtheentirecertificaterevocationlist (CRL)?
A. OCSP (Online CertificateStatusProtocol)
B. RA (RegistrationAuthority)
,C. CRL (CertificateRevocationList)
D. CSR (CertificateSigning Request)
A. OCSP (Online CertificateStatusProtocol)
Which protocolenablesa serverto communicatethestatusof a requested
certificate without returning an entire list?
A. CRL (CertificateRevocationList)
B. RA (RegistrationAuthority)
C. OCSP (Online CertificateStatusProtocol)
D. CSR (CertificateSigning Request)
C. OCSP (Online CertificateStatusProtocol)
What role doesa registrationauthority(RA) play in thecertificateprocess?
A. It checksthecertificatestatususing OCSP
B. It maintainsa list of revokedcertificates
C. It acceptsrequestsfor digital certificatesand validatestherequestor
D. It generatescertificatesigning requests
, C. It accepts requests for digital certificates and performs various additional
stepsto validatetherequestorhastheauthorizationto do so.
What is a certificatesigning request(CSR), and whatinformationdoesit
contain?
A. It is a list of revokedcertificates
B. It is a requestgeneratedon thedeviceneedingthecertificate, containing
necessary information for certificate creation
C. It is a protocolthatcheckscertificatestatus
D. It is a registrationauthorityvalidatingcertificaterequests
B. It is a requestgeneratedon thedeviceneedingthecertificate, containing
necessary information for certificate creation
The chief technology officer for a small publishing company has been tasked
with improving the company's security posture. As part of a network upgrade,
the company has decided to implement intrusion detection, spam filtering,
content filtering, and antivirus controls. The project
needsto be completed
using theleastamountof infrastructure while meeting all requirements.