Real
2025UPDATE/PRACTICE QUESTIONS AND CORRECT VERIFIED
ANSWERS (complete solutions) ASSURED SUCCESS/GRADED A+!!!Wgu
/
D488 CybersecurityArchitectureAnd EngineeringOA/ D488 OA Prep Test
Bank 2
What is thepurposeof iptableson a hostcomputer?
A. Routing
B. Firewall
C. Switching
D. Encryption
B. Firewall
Which protocolwouldbe usedto managea routersecurelyfrom a technician'slaptop?
A. Telnet
B. RDP
C. SSH
D. FTP
C. SSH
How shouldI protectmy managementinterfaceon a switchwhenI needto configure it
remotely? Choose two answers.
,A. OSPF
B. OOB management
C. Strongpassword
D. RIP v2
B. OOB management
C. Strongpassword
Which is thesecuritymodulethatwouldstorean e-commerceserver'sprivatekey?
A. DLP
B. HSM
C. DPI
D. 802.1x
B. HSM
How can I mitigatethethreatof dataleakage?
A. Through DLP
B. Through HSM
C. Through DPI
D. Through 802.1x
A. Through DLP
What typeof IDS wouldI be using if I neededto updatemy definitionfiles?
A. Anomaly
B. Behavior
,C. Heuristics
D. Signature
D. Signature
What is an Ethernetstandardfor portaccessprotocol,usedfor protecting networks via
authentication?
A. 802.11
B. 802.3
C. 802.1x
D. 802.5
C. 802.1x
What typeof connectivitywill allow key personnelto maintaincommunication with
one another and key network resources when
the main network is under
attack?
A. Email
B. OOB
C. Teams
D. VNC
B. OOB
What is a disadvantagewhenusing a virtualdesktopinfrastructure(VDI)?
A. Relianceon networks
B. Betteruseof hardwareresources
C. Enhancedsecurity
D. Standardoperatingenvironment(SOE)
, A. Relianceon networks
What is usedwhenmy contractorsusea tabletor thin clientto accessa Windows 10
desktop in my data center?
A. OOB
B. MDM
C. VDI
D. SSH
C. VDI
What typeof routingwill helpto mitigatea DDoS attack?
A. OSPF
B. RTBH
C. RIP
D. EIGRP
B. RTBH
What shouldI configureon mobileusers'laptopcomputersto ensuretheywill not be
vulnerable to sniffing/eavesdropping when accessing the hotel's
-Fi network?
Wi
A. Anti-malware
B. Shielding
C. Cable locks
D. VPN
D. VPN