WGU D488 Final Exam (Latest 2025/ 2026 Update)
Cybersecurity Architecture and Engineering| Questions &
Answers| Grade A| 100% Correct (Verified Solutions)
Design k Secure k Network k Architecture k - k 25% k - k CORRECT k ANSWER k -Section k 1
Identity k and k Access k Management k - k CORRECT k ANSWER k -
A k framework k of k policies k and k technologies k used k to k manage k digital k identities k and
k control k user kaccess k to k a k resource k within k an k organization
Password k Policy k - k CORRECT k ANSWER k -
Rules k set k to k enforce k strong k password k creation k and k management, k including
k requirements k for klength, k history, k complexity, k and k more.
Privileged k Access k Management k - k CORRECT k ANSWER k -
A k security k practice k that k monitors k and k controls k access k to k critical k systems k and k data
k by k users kwith k elevated k access k (e.g. k admin k accounts)
Password k Complexity k - k CORRECT k ANSWER k -
A k set k of k rules k designed k to k make k a k password k stronger k and k more k difficult k to k crack
k or k guess.
Kerberos k - k CORRECT k ANSWER k -
A k network k authentication k protocol k that k uses k symmetric k key k cryptography k to
k securely k authen kticate k users k and k services k over k the k network.
Mandatory k Access k Control k (MAC) k - k CORRECT k ANSWER k -
A k security k model k where k access k to k resources k is k determined k by k system-
enforced k policies. k Access k is k granted k based k on k labels k or k classifications. k (e.g. k "Top
k Secret")
, Attribute-Based k Access k Control k (ABAC) k - k CORRECT k ANSWER k -
A ksecurity kmodel kwhere kaccess kto kresources kis kdetermined kby kattributes ksuch kas kuser
krole, kl kocation, k time k of k access, k etc...
In-band k authentication k - k CORRECT k ANSWER k -
A ksecurity kmethod k where k authentication k occurs kwithin k the k same kcommunication
k channel k us ked k to k access k the k service k or k system. k An k example k will k include
k receiving k a k verification k token k o kn k the k same k device k you k are k using k to k login.
Out-of-Band k authentication k - k CORRECT k ANSWER k -
A k security k method k where k authentication k occurs k using k a k separate k communication
k channel k fr kom k the k primary k one. k An k example k includes k receiving k a k verification
k email k with k a k code k to k conf kirm k your k identity.
Challenge k Handshake k Authentication k Protocol k (CHAP) k - k CORRECT k ANSWER k -
A k secure k authentication k protocol k used k to k verify k the k identity k of k a k user k or k device
k over k the k ne ktwork k by k sending k them k a k "challenge" k (random k value) k from k the
k server k to k the k client.
JSON k Web k Token k - k CORRECT k ANSWER k -A k compact, k URL-
safe k token k format k used k for k securely k transmitting k information k between k two k parties
k as k a k JSO kN k object.
Trusted k Platform k Module k (TPM) k - k CORRECT k ANSWER k -
a khardware kbased ksecurity kdevice kused kto kstore kcryptographic kkeys, kpasswords, kand
kother ks kensitive kdata ksecurely. kThis ksecurity kdevice kensures kthat kthe ksystem khardware
kand ksoftware khasn't k been k tampered k with.
Single k Sign k On k (SSO) k - k CORRECT k ANSWER k -
An k authentication k process k that k allows k users k to k access k multiple k applications k or
k systems k using ksingle k set k of k credentials.
Cybersecurity Architecture and Engineering| Questions &
Answers| Grade A| 100% Correct (Verified Solutions)
Design k Secure k Network k Architecture k - k 25% k - k CORRECT k ANSWER k -Section k 1
Identity k and k Access k Management k - k CORRECT k ANSWER k -
A k framework k of k policies k and k technologies k used k to k manage k digital k identities k and
k control k user kaccess k to k a k resource k within k an k organization
Password k Policy k - k CORRECT k ANSWER k -
Rules k set k to k enforce k strong k password k creation k and k management, k including
k requirements k for klength, k history, k complexity, k and k more.
Privileged k Access k Management k - k CORRECT k ANSWER k -
A k security k practice k that k monitors k and k controls k access k to k critical k systems k and k data
k by k users kwith k elevated k access k (e.g. k admin k accounts)
Password k Complexity k - k CORRECT k ANSWER k -
A k set k of k rules k designed k to k make k a k password k stronger k and k more k difficult k to k crack
k or k guess.
Kerberos k - k CORRECT k ANSWER k -
A k network k authentication k protocol k that k uses k symmetric k key k cryptography k to
k securely k authen kticate k users k and k services k over k the k network.
Mandatory k Access k Control k (MAC) k - k CORRECT k ANSWER k -
A k security k model k where k access k to k resources k is k determined k by k system-
enforced k policies. k Access k is k granted k based k on k labels k or k classifications. k (e.g. k "Top
k Secret")
, Attribute-Based k Access k Control k (ABAC) k - k CORRECT k ANSWER k -
A ksecurity kmodel kwhere kaccess kto kresources kis kdetermined kby kattributes ksuch kas kuser
krole, kl kocation, k time k of k access, k etc...
In-band k authentication k - k CORRECT k ANSWER k -
A ksecurity kmethod k where k authentication k occurs kwithin k the k same kcommunication
k channel k us ked k to k access k the k service k or k system. k An k example k will k include
k receiving k a k verification k token k o kn k the k same k device k you k are k using k to k login.
Out-of-Band k authentication k - k CORRECT k ANSWER k -
A k security k method k where k authentication k occurs k using k a k separate k communication
k channel k fr kom k the k primary k one. k An k example k includes k receiving k a k verification
k email k with k a k code k to k conf kirm k your k identity.
Challenge k Handshake k Authentication k Protocol k (CHAP) k - k CORRECT k ANSWER k -
A k secure k authentication k protocol k used k to k verify k the k identity k of k a k user k or k device
k over k the k ne ktwork k by k sending k them k a k "challenge" k (random k value) k from k the
k server k to k the k client.
JSON k Web k Token k - k CORRECT k ANSWER k -A k compact, k URL-
safe k token k format k used k for k securely k transmitting k information k between k two k parties
k as k a k JSO kN k object.
Trusted k Platform k Module k (TPM) k - k CORRECT k ANSWER k -
a khardware kbased ksecurity kdevice kused kto kstore kcryptographic kkeys, kpasswords, kand
kother ks kensitive kdata ksecurely. kThis ksecurity kdevice kensures kthat kthe ksystem khardware
kand ksoftware khasn't k been k tampered k with.
Single k Sign k On k (SSO) k - k CORRECT k ANSWER k -
An k authentication k process k that k allows k users k to k access k multiple k applications k or
k systems k using ksingle k set k of k credentials.