100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D488 – Cybersecurity Architecture and Engineering – OA Prep Test Bank 3 – Complete 2025 Exam Practice with Verified Answers

Rating
-
Sold
-
Pages
42
Grade
A+
Uploaded on
11-12-2025
Written in
2025/2026

This document contains a comprehensive test bank for the WGU D488 Cybersecurity Architecture and Engineering Objective Assessment (OA). It includes scenario-based questions, definitions, and multiple-choice items with confirmed correct answers covering disaster recovery, encryption, access control, threat actors, risk management, incident response, cloud security, and cryptographic algorithms. The content is aligned with the 2025 exam structure and provides detailed coverage of key concepts needed for exam readiness.

Show more Read less
Institution
WGU D488 – Cybersecurity Architecture And Engineer
Course
WGU D488 – Cybersecurity Architecture and Engineer











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D488 – Cybersecurity Architecture and Engineer
Course
WGU D488 – Cybersecurity Architecture and Engineer

Document information

Uploaded on
December 11, 2025
Number of pages
42
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D488 OA PREP CYBERSECURITY ARCHITECTURE
AND ENGINEERING EXAM TEST BANK 3 / D488
OBJECTIVE ASSESSMENT TEST BANK | COMPLETE 2025
ACTUAL EXAM WITH CORRECT VERIFIED ANSWERS |
GUARANTEED A+ EXAM EXCELLENCE

A financial institution is required to comply with the Payment Card
Industry Data Security Standard (PCI DSS), which sets requirements for
the protection of payment card data. The institution uses various
software programs and utilities to manage payment card data, and it is
essential to ensure that only authorized programs and utilities are
allowed on the institution's systems.




Which security control will meet the needs of the institution?


Application allowlisting




What is SIEM?
Security information and event management. SIEM gives security
teams a central place to collect, aggregate, and analyze volumes of
data across an enterprise, effectively streamlining security workflows.

,It also delivers operational capabilities such as compliance reporting,
incident management, and dashboards that prioritize threat activity.




A regional hospital with budget constraints stores critical patient
information and medical records on local servers.




Which type of disaster recovery site will ensure that the hospital can
quickly resume operations in case of a disaster?


A warm site that is partially equipped with the necessary hardware
and software to be operational in a short period of time




A manufacturing company is evaluating continuity options for its critical
systems and data.




Which protocol will ensure that the company can respond to an
unexpected event by ensuring that its critical systems are available and
responsive with minimal downtime and data loss?

,Disaster recovery (DR) protocol, to ensure that recovery procedures
are executed in a consistent and efficient manner




An e-commerce company is developing a disaster recovery plan and
wants to determine how long its systems or applications can be down
before causing significant harm to the business.




What is the term used to describe this metric?


Maximum tolerable downtime (MTD)




A company is planning to update its disaster recovery plan to ensure
that it meets the latest regulations on securing personally identifiable
information (PII).




What is the term used to describe the process of identifying and
evaluating the effect that the updated plan will have on the company's
operations and stakeholders?


Privacy Impact Assessment (PIA)

, In the event of a cyberattack, a company's security team needs to be
able to respond quickly and remediate the issue to minimize the
impact.




Which solution will streamline the incident response process?


Security orchestration, automation, and response (SOAR)




What is SOAR?
SOAR—for security orchestration, automation and response—is a
software solution that enables security teams to integrate and
coordinate separate security tools, automate repetitive tasks and
streamline incident and threat response workflows.




A company's website is a critical component of their business
operations. However, due to an unexpected disaster, their website is
experiencing a high volume of traffic, which is negatively affecting its
performance. As part of their disaster recovery plan, the company is

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
eduustudent stuvia
View profile
Follow You need to be logged in order to follow users or courses
Sold
10
Member since
10 months
Number of followers
0
Documents
1577
Last sold
1 month ago

3.7

3 reviews

5
2
4
0
3
0
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions