WGU D488 Pre- Assessment (Latest Update 2025 / 2026) Cybersecurity Architecture and Engineering | Questions and Answers | Grade A | 100% Correct (Verified Solutions)
Question:
Which risk management strategy will ensure the security of data stored on a software application?
Answer:
Encryption of all sensitive data stored within the application
Question:
A manufacturing company recently conducted a cybersecurity assessment which identified several vulnerabilities, including unsecured wireless networks and a lack of knowledge of cybersecurity best practices by employees. Which risk mitigation process should the company use to address these vulnerabilities?
Answer:
Implement wireless network encryption and enforce regular employee security training
- / 3
Question:
A company is concerned about the security of its network and wants to implement a control that will allow only preapproved software to run on its endpoints. Which control should the company implement to achieve this goal?
Answer:
Allowlisting
Question:
A company has discovered a vulnerability in its Kubernetes deployment that allows attackers to execute commands on the Kubernetes cluster's nodes. The company has decided to implement risk mitigation processes to address this vulnerability. Which risk mitigation process is the most effective in mitigating the vulnerability associated with the Kubernetes deployment?
Answer:
Implementing network segmentation to isolate the Kubernetes nodes from the rest of the network
Question:
An organization is developing a new telemedicine platform to provide remote healthcare services to patients and has asked a cybersecurity analyst to help develop a risk management plan for the new platform. What is the correct sequence of steps in the risk management process in this scenario?
Answer:
Identify business assets, identify known vulnerabilities, identify threats, identify business impact, and identify risk response 2 / 3
Question:
An organization has recently signed a contract with a new vendor to provide a critical service. The service will involve the vendor having access to sensitive customer data. The organization's management is concerned about the risks associated with using a new vendor and wants to know the best ways to mitigate those risks. Which strategy will meet the needs of the company?
Answer:
Conducting a vendor viability assessment to ensure the vendor has the necessary resources and expertise to provide the service
Question:
A large financial institution has experienced a significant increase in phishing attacks targeting its employees. The institution is concerned about the potential financial and reputational damages caused by a successful phishing attack. Which security control will mitigate the risk of a successful phishing attack on the financial institution's employees?
Answer:
Conducting regular security awareness training for employees
Question:
Which emerging technology has the potential to significantly impact the security of current encryption methods by making it possible to quickly solve mathematical problems that are currently considered difficult or impossible to solve?
Answer:
Quantum computing
- / 3