WGU D488 Cybersecurity Architecture & Engineering
OBJECTIVE ASSESSMENT ACTUAL EXAM COMPLETE
QUESTIONS AND CORRECT DETAILED ANSWERS ||
100% GUARANTEED PASS <LATEST VERSION>
Which type of security should a business use on its layer 2 switch
to isolate the finance network from other departmental
networks?
A - Virtual Private Network (VPN)
B - Internet Protocol Security (IPSec)
C - Virtual Local Area Network (VLAN)
D - Remotely Triggered Black Hole (RTBH) .......Answer.........C -
Virtual Local Area Network (VLAN)
,age 2 of 197
VLANs allow companies to logically segment network traffic,
ensuring devices on different VLANs cannot communicate unless
otherwise specified in a layer 3 device like a router.
Which type of software testing should be used when there has
been a change within the existing environment?
A - Regression Testing
B - Penetration Testing
C - Requirements Testing
D - Release Testing .......Answer.........A - Regression Testing
Regression testing ensures that recent changes within the
environment have not introduced new defects or broken existing
functionality.
,age 3 of 197
Which security technique should be used to detect a weak
password that may match common dictionary words?
A - Password Spraying
B - Password Auditing
C - Password Guessing
D - Password History .......Answer.........B - Password Auditing
Password auditing allows for existing passwords to be
compared against known weak passwords to help determine the
security of a credential.
What should an organization implement if it wants users of their
site to provide a password, memorable word, and pin?
A - Multi-factor authentication (MFA)
, age 4 of 197
B - Two-factor authentication (2FA)
C - Two-step verification
D - Single-factor authentication .......Answer.........A - Multi-factor
authentication
MFA enhances security by requiring multiple forms of
authentication, therefore reducing the risk of unauthorized
access.
A network technician is asked by their manager to update
security to block several known bad actor IP addresses.
A - Signature rules
B - Firewall rules