100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D488 Cybersecurity Architecture and Engineering OA EXAM A&B COMPLETE 1200 QUESTIONS AND VERIFIED SOLUTIONS LATEST UPDATE THIS YEAR

Rating
-
Sold
-
Pages
617
Grade
A+
Uploaded on
14-12-2025
Written in
2025/2026

Tap on AVAILABLE IN BUNDLE / PACKAGE DEAL to unlock free bonus exams — save more while getting everything you need! You’ll be glad you did! WGU D488 Cybersecurity Architecture and Engineering OA Exam A&B 2026–2027 COMPLETE 1200 QUESTIONS AND VERIFIED SOLUTIONS LATEST UPDATE THIS YEAR is a fully updated and comprehensive study resource designed to help students confidently pass the WGU D488 Cybersecurity Architecture and Engineering Objective Assessment (OA) exams (Versions A & B). This complete guide includes 1,200 exam-style questions with verified solutions, covering essential topics such as cybersecurity architecture, network security, risk management, cryptography, security protocols, threat detection, incident response, system engineering, and best practices for securing enterprise environments. Structured for efficient study and practical application, this resource helps reduce exam anxiety, reinforce critical cybersecurity knowledge, and ensure you are fully prepared to pass the WGU D488 Cybersecurity Architecture and Engineering OA Exams A & B on your first attempt with confidence.

Show more Read less
Institution
WGU D488 Cybersecurity Architecture And Engineerin
Course
WGU D488 Cybersecurity Architecture and Engineerin











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D488 Cybersecurity Architecture and Engineerin
Course
WGU D488 Cybersecurity Architecture and Engineerin

Document information

Uploaded on
December 14, 2025
Number of pages
617
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Page 1 of 617




WGU D488 Cybersecurity Architecture and

Engineering OA EXAM A&B 2026-2027 COMPLETE

1200 QUESTIONS AND VERIFIED SOLUTIONS

LATEST UPDATE THIS YEAR
D488 - Cybersecurity Architecture & Engineering OA


QUESTION: A network technician is asked by their manager to update security to block several

known bad actor IP addresses.


A - Signature rules


B - Firewall rules


C - Behavior rules


D - Data loss prevention (DLP) rules - ANSWER-B - Firewall rules




Firewall rules can be set up to deny traffic coming from known malicious IP addresses.




QUESTION: On a shopping website, there is a 500-millisecond delay when the authorized

payment button is selected for purchases. Attackers have been running a script to alter the final

,Page 2 of 617


payment that takes 200 milliseconds. Which vulnerability on the website is being targeted by

the attackers?


A - Buffer Overflow


B - Integer Overflow


C - Broken Authentication


D - Race Condition - ANSWER-D - Race Condition




A race condition occurs when multiple processes or actions are executed simultaneously, and

the outcome depends on the sequence or timing of events.




QUESTION: A company wants to provide laptops to its employees so they can work remotely.

What should be implemented to ensure only work applications can be installed on company

laptops?


A - Containerization


B - Token-based access


C - Patch repository


D - Whitelisting - ANSWER-D - Whitelisting

,Page 3 of 617




Whitelisting ensures that only approved applications can be installed and executed on company

laptops.




QUESTION: What should a business use to provide non-repudiation for emails between

employees?


A - TLS/SSL


B - AES-256


C - S/MIME


D - IPSec - ANSWER-C - S/MIME (Secure/Multipurpose Internet Mail Extensions)




S/MIME provides non-repudiation for emails by using digital signatures.




QUESTION: Which strategy is appropriate for a risk management team to determine if a

business has insufficient security controls?


A - Qualitative assessment


B - Gap assessment

, Page 4 of 617


C - Quantitative risk assessment


D - Impact assessment - ANSWER-B - Gap assessment




A gap assessment identifies the gaps between the current security control and the desired or

required levels of security.




Q; Which type of security should a business use on its layer 2 switch to isolate the finance

network from other departmental networks?


A - Virtual Private Network (VPN)


B - Internet Protocol Security (IPSec)


C - Virtual Local Area Network (VLAN)


D - Remotely Triggered Black Hole (RTBH) - ANSWER-C - Virtual Local Area Network (VLAN)




VLANs allow companies to logically segment network traffic, ensuring devices on different

VLANs cannot communicate unless otherwise specified in a layer 3 device like a router.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
HustlingORPHANpleaseHelpp Walden University
View profile
Follow You need to be logged in order to follow users or courses
Sold
6413
Member since
3 year
Number of followers
63
Documents
2371
Last sold
1 day ago

4.2

25 reviews

5
13
4
5
3
6
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions