CYBERSECURITY ARCHITECTURE AND
ENGINEERING OA EXAM TEST BANK 2 | COMPLETE
2025 ACTUAL EXAM WITH CORRECT VERIFIED
ANSWERS | GUARANTEED A+ EXAM EXCELLENCE
Which cryptographic protocol is used in WPA3 to provide authenticated
encryption and supports both 128-bit and 192-bit AES encryption?
A. CCMP (Cipher Block Chaining Message Authentication Code Protocol)
B. SAE (Simultaneous Authentication of Equals)
C. GCMP (Galois Counter Mode Protocol)
D. Protection frames
C. GCMP (Galois Counter Mode Protocol)
Which foundational element of blockchain distributes computation across
multiple systems so that no individual system can read the other parties' data?
A. Hashing
B. Distributed consensus
C. Multiparty computation
D. Object storage
C. Multiparty computation
,What component of WPA3 helps protect against key recovery attacks by
mandating the use of certain frames?
A. SAE (Simultaneous Authentication of Equals)
B. Protection frames
C. CCMP (Cipher Block Chaining Message Authentication Code Protocol)
D. GCMP (Galois Counter Mode Protocol)
B. Protection frames
The security team plans to deploy an intrusion detection system (IDS) solution to
alert engineers about inbound threats. The team already has a database of
signatures that they want the IDS solution to validate.
Which detection technique meets the requirements?
A) Intrusion detection
B) Deep packet inspection
C) Signature-based detection
D) Intrusion prevention
C) Signature-based detection
,An IT organization had a security breach after deploying an update to its
production web servers. The application currently goes through a manual update
process a few times per year. The security team needs to recommend a failback
option for future deployments.
Which solution fulfills these requirements?
A) Implementing a code scanner
B) Implementing code signing
C) Implementing versioning
D) Implementing a security requirements traceability matrix (SRTM)
C) Implementing versioning
A software development team is working on a new mobile application that will be
used by customers. The security team must ensure that builds of the application
will be trusted by a variety of mobile devices.
Which solution fulfills these requirements?
A) Code scanning
B) Regression testing
C) Code signing
D) Continuous delivery
C) Code signing
, An IT organization recently suffered a data leak incident. Management has asked
the security team to implement a print blocking mechanism for all documents
stored on a corporate file share.
Which solution fulfills these requirements?
A) Virtual desktop infrastructure (VDI)
B) Remote Desktop Protocol (RDP)
C) Digital rights management (DRM)
D) Watermarking
C) Digital rights management (DRM)
A company has recently discovered that a competitor is distributing copyrighted
videos produced by the in-house marketing team. Management has asked the
security team to prevent these types of violations in the future.
Which solution fulfills these requirements?
A) Virtual desktop infrastructure (VDI)
B) Secure Socket Shell (SSH)
C) Digital rights management (DRM)
D) Remote Desktop Protocol (RDP)
C) Digital rights management (DRM)