100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D488 OBJECTIVE ASSESSMENT TEST BANK / D488 OA Test Bank | Cybersecurity Architecture and Engineering OA Exam QUESTIONS AND CORRECT ANSWERS | LATEST 2026/2027 | GRADED A+.

Rating
-
Sold
-
Pages
172
Grade
A+
Uploaded on
12-12-2025
Written in
2025/2026

WGU D488 OBJECTIVE ASSESSMENT TEST BANK / D488 OA Test Bank | Cybersecurity Architecture and Engineering OA Exam QUESTIONS AND CORRECT ANSWERS | LATEST 2026/2027 | GRADED A+. The chief technology officer for a small publishing company has been tasked with improving the company's security posture. As part of a network upgrade, the company has decided to implement intrusion detection, spam filtering, content filtering, and antivirus controls. The project needs to be completed using the least amount of infrastructure while meeting all requirements. Which solution fulfills these requirements? A - Deploying an anti-spam gateway B - Deploying a proxy server C - Deploying a unified threat management (UTM) appliance D - Deploying a web application firewall (WAF) - CORRECT ANSWER-C - Deploying a unified threat management (UTM) appliance The security team plans to deploy an intrusion detection system (IDS) solution to alert engineers about inbound threats. The team already has a database of signatures that they want the IDS solution to validate. Which detection technique meets the requirements? A - Intrusion detection B - Deep packet inspection C - Signature-based detection D - Intrusion prevention - CORRECT ANSWER-C - Signature-based detection An IT organization had a security breach after deploying an update to its production web servers. The application currently goes through a manual update process a few times per year. The security team needs to recommend a failback option for future deployments. Which solution fulfills these requirements? A - Implementing a code scanner B - Implementing code signing C - Implementing versioning D - Implementing a security requirements traceability matrix (SRTM) - CORRECT ANSWER-C - Implementing versioning The security team recently enabled public access to a web application hosted on a server inside the corporate network. The developers of the application report that the server has received several structured query language (SQL) injection attacks in the past several days. The team needs to deploy a solution that will block the SQL injection attacks. Which solution fulfills these requirements? A - Virtual private network (VPN) B - Security information and event management (SIEM) C - Web application firewall (WAF) D - Secure Socket Shell (SSH) - CORRECT ANSWER-C - Web application firewall (WAF) An IT security team has been notified that external contractors are using their personal laptops to gain access to the corporate network. The team needs to recommend a solution that will prevent unapproved devices from accessing the network. Which solution fulfills these requirements? A - Implementing a demilitarized zone (DMZ) B - Installing a hardware security module C - Implementing port security D - Deploying a software firewall - CORRECT ANSWER-C - Implementing port security An IT organization recently suffered a data leak incident. Management has asked the security team to implement a print blocking mechanism for all documents stored on a corporate file share. Which solution fulfills these requirements? A - Virtual desktop infrastructure (VDI) B - Remote Desktop Protocol (RDP) C - Digital rights management (DRM) D - Watermarking - CORRECT ANSWER-C - Digital rights management (DRM) A company has recently discovered that a competitor is distributing copyrighted videos produced by the in-house marketing team. Management has asked the security team to prevent these types of violations in the future. Which solution fulfills these requirements? A - Virtual desktop infrastructure (VDI) B - Secure Socket Shell (SSH) C - Digital rights management (DRM) D - Remote Desktop Protocol (RDP) - CORRECT ANSWER-C - Digital rights management (DRM) A security team has been tasked with performing regular vulnerability scans for a cloud-based infrastructure. How should these vulnerability scans be conducted when implementing zero trust security? A - Manually B - Annually C - Automatically D - As needed - CORRECT ANSWER-C - Automatically A healthcare company needs to ensure that medical researchers cannot inadvertently share protected health information (PHI) data from medical records. What is the best solution? A - Encryption - - B Metadata C Anonymization D - Obfuscation - CORRECT ANSWER-C - Anonymization A software development team is working on a new mobile application that will be used by customers. The security team must ensure that builds of the application will be trusted by a variety of mobile devices. Which solution fulfills these requirements? A - Code scanning B - Regression testing C - Code signing D - Continuous delivery - CORRECT ANSWER-C - Code signing A security team has been tasked with mitigating the risk of stolen credentials after a recent breach. The solution must isolate the use of privileged accounts. In the future, administrators must request access to mission-critical services before they can perform their tasks. What is the best solution? A - Identity and access management (IAM) B - Password policies C - Privileged access management (PAM)

Show more Read less











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
December 12, 2025
Number of pages
172
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • wgu d488

Content preview

WGU D488 OBJECTIVE ASSESSMENT TEST BANK / D488 OA
Test Bank | Cybersecurity Architecture and Engineering OA Exam
QUESTIONS AND CORRECT ANSWERS | LATEST 2026/2027 |
GRADED A+.




The chief technology officer for a small publishing company has been tasked with
improving the company's security posture. As part of a network upgrade, the
company has decided to implement intrusion detection, spam filtering, content
filtering, and antivirus controls. The project needs to be completed using the least
amount of infrastructure while meeting all requirements. Which solution fulfills
these requirements?

A - Deploying an anti-spam gateway

B - Deploying a proxy server

C - Deploying a unified threat management (UTM) appliance

D - Deploying a web application firewall (WAF) - CORRECT ANSWER-C -
Deploying a unified threat management (UTM) appliance



The security team plans to deploy an intrusion detection system (IDS) solution to
alert engineers about inbound threats. The team already has a database of
signatures that they want the IDS solution to validate. Which detection technique
meets the requirements? A - Intrusion detection

B - Deep packet inspection

C - Signature-based detection

D - Intrusion prevention - CORRECT ANSWER-C - Signature-based detection

,An IT organization had a security breach after deploying an update to its
production web servers. The application currently goes through a manual update
process a few times per year. The security team needs to recommend a failback
option for future deployments. Which solution fulfills these requirements?

A - Implementing a code scanner

B - Implementing code signing

C - Implementing versioning

D - Implementing a security requirements traceability matrix (SRTM) -
CORRECT ANSWER-C - Implementing versioning


The security team recently enabled public access to a web application hosted on a
server inside the corporate network. The developers of the application report that
the server has received several structured query language (SQL) injection attacks
in the past several days. The team needs to deploy a solution that will block the
SQL injection attacks. Which solution fulfills these requirements?

A - Virtual private network (VPN)

B - Security information and event management (SIEM)

C - Web application firewall (WAF)

D - Secure Socket Shell (SSH) - CORRECT ANSWER-C - Web application
firewall (WAF)



An IT security team has been notified that external contractors are using their
personal laptops to gain access to the corporate network. The team needs to
recommend a solution that will prevent unapproved devices from accessing the
network. Which solution fulfills these requirements?

,A - Implementing a demilitarized zone (DMZ)

B - Installing a hardware security module

C - Implementing port security

D - Deploying a software firewall - CORRECT ANSWER-C - Implementing port
security



An IT organization recently suffered a data leak incident. Management has asked
the security team to implement a print blocking mechanism for all documents
stored on a corporate file share. Which solution fulfills these requirements?

A - Virtual desktop infrastructure (VDI)

B - Remote Desktop Protocol (RDP)

C - Digital rights management (DRM)

D - Watermarking - CORRECT ANSWER-C - Digital rights management (DRM)


A company has recently discovered that a competitor is distributing copyrighted
videos produced by the in-house marketing team. Management has asked the
security team to prevent these types of violations in the future. Which solution
fulfills these requirements?

A - Virtual desktop infrastructure (VDI)

B - Secure Socket Shell (SSH)

C - Digital rights management (DRM)

D - Remote Desktop Protocol (RDP) - CORRECT ANSWER-C - Digital rights
management (DRM)

, A security team has been tasked with performing regular vulnerability scans for a
cloud-based infrastructure. How should these vulnerability scans be conducted
when implementing zero trust security?

A - Manually

B - Annually

C - Automatically

D - As needed - CORRECT ANSWER-C - Automatically


A healthcare company needs to ensure that medical researchers cannot
inadvertently share protected health information (PHI) data from medical records.
What is the best solution?

A - Encryption

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ExcelAcademia2026 Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
2056
Member since
4 year
Number of followers
1648
Documents
7416
Last sold
6 hours ago
EXCEL ACADEMIA TUTORS

At Excel Academia Tutoring, You will get solutions to all subjects in both assignments and major exams. Contact me for assistance. Good luck! Well-researched education materials for you. Expert in Nursing, Mathematics, Psychology, Biology etc. My Work has the Latest & Updated Exam Solutions, Study Guides and Notes (100% Verified Solutions that Guarantee Success)

3.7

337 reviews

5
139
4
74
3
62
2
19
1
43

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions