D488 - Cybersecurity Architecture and Engineering
(CASP+) NEWEST EXAM 2025-2026 | COMPLETE
QUESTIONS AND CORRECT ANSWERS | GRADED
A+ | LATEST EXAM | VERIFIED ANSWERS
The security operations C) Supply chain
center (SOC) team just
received a notification that
multiple
vulnerabilities are present in
the codebase of a corporate
application.
Which threat type is most
likely in this scenario?
A) Advanced persistent threat
B) Insider threat
C) Supply chain
D) Organized crime
The security team plans to C) Signature-based detection
deploy an intrusion detection
system (IDS) solution to
alert engineers about
inbound threats. The team
already has a database of
signatures that they want
the IDS solution to validate.
Which detection technique
meets the requirements?
https://quizlet.com/935107006/d488-cybersecurity-architecture-and-engineering-casp-flash-cards/ 1/500
,10/20/25, 8:06 PM D488 - Cybersecurity Architecture and Engineering (CASP+)
A) Intrusion detection
B) Deep packet inspection
C) Signature-based detection
D) Intrusion prevention
An IT organization recently C) Digital rights management (DRM)
suffered a data leak
incident. Management has
asked the security team to
implement a print blocking
mechanism for all
documents stored on a
corporate file share.
Which solution fulfills these
requirements?
A) Virtual desktop
infrastructure (VDI)
B) Remote Desktop Protocol
(RDP)
C) Digital rights management
(DRM)
D) Watermarking
A company has recently C) Digital rights management (DRM)
discovered that a
competitor is distributing
copyrighted videos
produced by the in-house
marketing team.
Management has asked the
security team to prevent
these types of violations in
the future.
Which solution fulfills these
requirements?
https://quizlet.com/935107006/d488-cybersecurity-architecture-and-engineering-casp-flash-cards/ 2/500
,10/20/25, 8:06 PM D488 - Cybersecurity Architecture and Engineering (CASP+)
A) Virtual desktop
infrastructure (VDI)
B) Secure Socket Shell (SSH)
C) Digital rights management
(DRM)
D) Remote Desktop Protocol
(RDP)
https://quizlet.com/935107006/d488-cybersecurity-architecture-and-engineering-casp-flash-cards/ 3/500
, 10/20/25, 8:06 PM D488 - Cybersecurity Architecture and Engineering (CASP+)
A security team has been C) Automatically
tasked with performing
regular vulnerability scans
for a cloud-based
infrastructure.
How should these
vulnerability scans be
conducted when
implementing zero trust
security?
A) Manually
B) Annually
C) Automatically
D) As needed
A healthcare company needs C) Anonymization
to ensure that medical
researchers cannot
inadvertently
share protected health
information (PHI) data
from medical records.
What is the best solution?
A) Encryption
B) Metadata
C) Anonymization
D) Obfuscation
https://quizlet.com/935107006/d488-cybersecurity-architecture-and-engineering-casp-flash-cards/ 4/500