100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D488 – Cybersecurity Architecture & Engineering (2025/2026) | Complete Study Guide with Verified Questions & Accurate Answers

Beoordeling
-
Verkocht
-
Pagina's
57
Cijfer
A+
Geüpload op
04-09-2025
Geschreven in
2025/2026

WGU D488 – Cybersecurity Architecture & Engineering (2025/2026) | Complete Study Guide with Verified Questions & Accurate Answers

Instelling
WGU D488 – Cybersecurity Architecture & Engineerin
Vak
WGU D488 – Cybersecurity Architecture & Engineerin











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
WGU D488 – Cybersecurity Architecture & Engineerin
Vak
WGU D488 – Cybersecurity Architecture & Engineerin

Documentinformatie

Geüpload op
4 september 2025
Aantal pagina's
57
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

WGU D488 – Cybersecurity Architecture &
Engineering (2025/2026) | Complete Study Guide
with Verified Questions & Accurate Answers


1. What is the term used to describe the assessment of whether a vendor will
remain in business?

Vendor viability

Source code escrow

Vendor lock-in

Vendor lockout

2. Devon is using an IaaS environment and would like to provision storage that
will be used as a disk attached to a server instance. What type of storage
should he use?

Archival storage

Object storage

Block storage

Database storage

3. If a company is implementing a new security policy that requires only
approved applications to run on employee workstations, which security
measure should they implement?

Block list

,Immutable system

Allow list

Antivirus software

,4. Bob has a key employee in a critical IT position. He is worried about the
possibility of the employee committing undetected fraud. Which of the
following is the best personnel security control he can implement to
control this?

mandatory vacation

need-to-know

Separation of duties

Least privilege

5. Describe how an allow list differs from a block list in terms of system
security.

An allow list is used for detecting malware, whereas a block list is for
system configuration.

An allow list is unchangeable, while a block list can be modified at
any time.

An allow list is a type of antivirus, while a block list is a method of
system auditing.

An allow list specifies which programs are permitted to run, while
a block list specifies which programs are not allowed.

6. A security architect is reviewing password compliance within the
organization. Which NIST standard can the security architect refer to for
password compliance?

NIST 800-84

NIST 800-53

NIST 800-207

, NIST 800-63

7. If a company experiences a data breach due to a compromised key and
lacks a key rotation policy, what immediate action should they take to
mitigate the risk?

Increase the number of keys

Implement a key rotation policy

Ignore the breach

Store keys in a public repository

8. If a company experiences repeated attacks from a specific IP address, what
action should be taken using firewall rules?

Block the specific IP address

Ignore the IP address as it may not be a threat

Allow the IP address to access the network

Increase bandwidth to accommodate more traffic

9. If a military unit needs to establish a data center quickly in a foreign country
with minimal setup and flexibility, which type of site should they choose and
why?

Cold site, because it is the least expensive option available.

Hot site, because it ensures no service disruption during operations.

Mobile site, because it offers flexibility and is designed for quick
deployment.

Warm site, because it provides a balance between cost and
operational capability.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
YANCHY Herzing University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1739
Lid sinds
3 jaar
Aantal volgers
1159
Documenten
23169
Laatst verkocht
1 week geleden
Ace Your Exams with Elite Study Resources | ExamEliteHub on Stuvia

I offer genuine and dependable exam papers that are directly obtained from well-known, reputable institutions as a highly regarded professional who specializes in sourcing study materials. These papers are invaluable resources made to help people who want to become nurses and people who work in other fields prepare for exams. Because of my extensive experience and in-depth knowledge of the subject, I take great care to ensure that each exam paper meets the highest quality, accuracy, and relevance standards, making them an essential component of any successful study plan.

Lees meer Lees minder
4,1

447 beoordelingen

5
251
4
58
3
85
2
18
1
35

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen