100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D483 Objective Assessment (Latest 2024/ 2025 Update) Security Operations | Qs & As| Grade A| 100% Correct (Verified Answers)

Rating
-
Sold
4
Pages
37
Grade
A+
Uploaded on
03-12-2024
Written in
2024/2025

WGU D483 Objective Assessment (Latest 2024/ 2025 Update) Security Operations | Qs & As| Grade A| 100% Correct (Verified Answers) Q: A system technician reviews system logs from various devices and notices discrepancies between recorded events. The events between the systems are not synchronizing in the correct order. Which configuration should the technician analyze and adjust to ensure proper and accurate logging? (Select the two best options. ) A. NTP B. GPS C. PKI D. SSL Answer: A. NTP B. GPS Time drift or time discrepancies can cause the system to create logs with incorrect time stamps. A time source can provide accuracy by using the Network Time Protocol (NTP) on the systems. Global Positioning System (GPS) is a location-providing technology. GPS does have the ability to provide time synchronization to a system while providing location coordinates. Public key infrastructure (PKI) is a technology that provides a suite of tools designed to support public/private key management, integrity checks via digital signatures, and authentication. It does not provide time synchronization services. A secure socket layer (SSL) is an encryption technology. SSL inspection is useful in inspecting encrypted HTTPS traffic; however, it will not provide a solution for time synchronization. Q: A cloud architect advises an associate to consider a serverless platform for their new endeavor. What benefits would the architect highlight about a serverless platform? (Select the two best options. ) A. Serverless platforms require the management of physical or virtual server instances. B. There are considerable management demands for file system security mon- itoring. C. There is no requirement to provision multiple servers for redundancy or load balancing. D. The service provider manages the underlying architecture. Answer: C D Q: A support technician examines the Windows registry for a host on a local area network (LAN). The technician uses which subkey to find username information for accounts used on a computer? A. SAM B. SECURITY C. DEFAULT D. SYSTEM Answer: A The Windows registry is a database for storing operating system, device, and software application configuration information. The support technician can use the Security Accounts Manager (SAM), which stores username information for accounts on the current computer. Q: An engineer is studying the hardware architecture of a company's various systems. The engineer can find the x86 architecture in which of the following items? (Select the three best options. ) A. Desktops B. ARM-based Tablets C. Laptops D. Servers Answer: A C D B Advanced RISC Machines (ARM) and x86 are common architectures. The x86 architecture dominates desktops, laptops, and server computers, while the ARM architecture dominates smartphones, tablets, and single-board computers. Q: A group of security engineers looks to achieve high data enrichment while compiling threat information for review. Which solution will the engineers apply to achieve this goal? A. Using different data sources B. Using automation C. Identifying threat areas D. Improving accuracy Answer: A. Using different data sources Q: An engineer enables a lightweight data sharing technology for trig- ger-based message sharing between security software applications. What automation feature does the engineer implement? A. Add-ons B. APIs C. Webhooks D. Plugins Answer: C. Webhooks The engineer will utilize webhooks in an automated messaging solution. They will implement webhooks to send automated messages from applications to other applications when certain events occur. The engineer can extend the functionality of many security tools with add-ons. In this case, the engineer uses an out-of-the-box solution for the required need. An application programming interface (API) is a set of functions and procedures that allow two or more applications to integrate. The engineer will use built-in functionality in this case. Plugins are additions that help to tailor a software product to match requirements more closely. In this case, the engineer will use built-in functionality. Q: A new software development organization looks to provide a security solution for an existing security product. In doing so, developers at the orga- nization utilize which technology from the existing product's toolkit to provide an integrated solution? A. SOAR B. SOC C. SIEM D. API Answer: D. API An application programming interface (API) is a set of functions and procedures that allow two or more applications to integrate. Developers can use the existing product's toolkit for integration. Security orchestration, automation, and response (SOAR) is a process of using technology to automate identifying, analyzing, and responding to security threats. Using SOAR does not apply to developers. Security operations centers (SOC) are integral to the success of an organization's information security program. Utilizing a SOC will not help the developers achieve their goals. Security information and event management (SIEM) automates the collection, analysis, and response to security-related data. The use of a SIEM will not be of help to the developers. Q: A local city council tasked its Information Technology (IT) department to implement an international-scale cybersecurity framework. The requirement is coming from their cyber security insurance vendor. The vendor warned that this set of frameworks is not freely available. Which industry framework should the IT department investigate? A. CIS B. PCI DSS C. OWASP D. ISO Answer: D. ISO The International Organization for Standardization (ISO) manages and publishes a cybersecurity framework called ISO 27k. Obtaining the ISO 27001 standard is not free of charge. The Center for Internet Security (CIS) benchmarks are a set of security configuration best practices. They provide a secure baseline configuration for various operating systems, applications, and hardware devices. Payment Card Industry Data Security Standard (PCI DSS) is a global data protection standard established and maintained by a consortium of payment card companies. PCI DSS identifies controls designed to prevent fraud, protect credit, and debit card data. The Open Web Application Security Project (OWASP) is a nonprofit foundation. OWASP is an international organization that provides unbiased, practical informa- tion about application security. Q: A boutique crafts company would like to set up a new eCommerce website. They are checking out vendors who have put a high level of detail in the securi- ty practices and implementation. They want to test a specific vendor's system to verify that it is not vulnerable to malicious actors injecting malformed data into the checkout process. Which kind of scan or test can the company run with permission? A. Baseline scan B. Map scan C. Fuzzing D. Internal scan Answer: C. Fuzzing Fuzzing is an unknown environment testing method using specialty software tools designed to identify problems and issues with an application by injecting malformed data into it. Q: A video production company has a server farm with graphics cards that allows the company to generate computer-generated imagery. Although the servers do not currently store any data and are not expensive, the company wants to ensure the security of its equipment. What is a compelling reason why the company should be proactive in preventing server vulnerabilities? A. Exploitability B. Low asset value C. High asset value D. Save power consumption Answer:

Show more Read less
Institution
WGU D48
Course
WGU D48











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D48
Course
WGU D48

Document information

Uploaded on
December 3, 2024
Number of pages
37
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGUlD483lObjectivelAssessmentl(Latest
lUpdate)lSecuritylOperationsl|lQsl&lAs|l
GradelA|l100%lCorrectl(VerifiedlAnswers)

Q:lAlsystemltechnicianlreviewslsystemllogslfromlvariousldeviceslandlnoticesldiscrepancieslbe
tweenlrecordedlevents.lTheleventslbetweenlthelsystems
arelnotlsynchronizinglinlthelcorrectlorder.lWhichlconfigurationlshouldltheltechnicianlanalyzelan
dladjustltolensurelproperlandlaccuratellogging?l(Selectltheltwolbestloptions.l)
A.lNTPlB.lGPSlC.lPKI
D.lSSL

Answer:
lA.lNTPlB.lGPS
Timeldriftlorltimeldiscrepancieslcanlcauselthelsystemltolcreatellogslwithlincorrectltimelstamps.l
AltimelsourcelcanlprovidelaccuracylbylusinglthelNetworklTimelProtocoll(NTP)lonlthelsystems.
l
GloballPositioninglSysteml(GPS)lislallocation-
providingltechnology.lGPSldoeslhavelthelabilityltolprovideltimelsynchronizationltolalsystemlwh
ilelprovidingllocationlcoordinates.l
Publiclkeylinfrastructurel(PKI)lislaltechnologylthatlprovideslalsuitelofltoolsldesignedltolsupport
lpublic/privatelkeylmanagement,lintegritylcheckslvialdigitallsignatures,landlauthentication.lItldo
eslnotlprovideltimelsynchronizationlservices.l
Alsecurelsocketllayerl(SSL)lislanlencryptionltechnology.lSSLlinspectionlisluseful
inlinspectinglencryptedlHTTPSltraffic;lhowever,litlwilllnotlprovidelalsolutionlforltimelsynchron
ization.l



Q:lAlcloudlarchitectladviseslanlassociateltolconsiderlalserverlesslplatformlforltheirlnewlendea
vor.lWhatlbenefitslwouldlthelarchitectlhighlightlaboutlalserverlesslplatform?l(Selectltheltwolbes
tloptions.l)
A.lServerlesslplatformslrequirelthelmanagementloflphysicallorlvirtuallserverlinstances.l
B.lTherelarelconsiderablelmanagementldemandslforlfilelsystemlsecuritylmon-litoring.l
C.lTherelislnolrequirementltolprovisionlmultiplelserverslforlredundancylorlload
l
balancing.l
D.lThelservicelproviderlmanageslthelunderlyinglarchitecture.l

Answer:

,lClD



Q:lAlsupportltechnicianlexamineslthelWindowslregistrylforlalhostlonlallocallarealnetworkl(L
AN).lTheltechnicianluseslwhichlsubkeyltolfindlusernamelinformationlforlaccountslusedlonlalco
mputer?
A.lSAMlB.lSECURITYlC.lDEFAULTlD.lSYSTEM

Answer:
lA
ThelWindowslregistrylislaldatabaselforlstoringloperatinglsystem,ldevice,landlsoftwarelapplicati
onlconfigurationlinformation.lThelsupportltechnicianlcanluselthelSecuritylAccountslManagerl(S
AM),lwhichlstoreslusernamelinformationlforlaccountslonlthelcurrentlcomputer.l



Q:lAnlengineerlislstudyinglthelhardwarelarchitectureloflalcompany'slvariouslsystems.lTheleng
ineerlcanlfindlthelx86larchitecturelinlwhichloflthelfollowinglitems?l(Selectlthelthreelbestloption
s.l)
A.lDesktops
B.lARM-basedlTablets
C.lLaptops
D.lServers

Answer:
lAlClD
B
AdvancedlRISClMachinesl(ARM)landlx86larelcommonlarchitectures.lThelx86larchitectureldo
minatesldesktops,llaptops,landlserverlcomputers,lwhilelthelARMlarchitectureldominateslsmartp
hones,ltablets,landlsingle-boardlcomputers.l



Q:lAlgrouploflsecuritylengineersllooksltolachievelhighldatalenrichmentlwhilelcompilinglthreat
linformationlforlreview.lWhichlsolutionlwilllthelengineerslapplyltolachievelthislgoal?
A.lUsingldifferentldatalsourceslB.lUsinglautomationlC.lIdentifyinglthreatlareas
D.lImprovinglaccuracy

Answer:
lA.lUsingldifferentldatalsources



Q:lAnlengineerlenableslallightweightldatalsharingltechnologylforltrig-

,ger-
basedlmessagelsharinglbetweenlsecuritylsoftwarelapplications.lWhatlautomationlfeatureldoeslth
elengineerlimplement?
A.lAdd-onslB.lAPIslC.lWebhooks
D.lPlugins

Answer:
lC.lWebhooks
l
Thelengineerlwilllutilizelwebhookslinlanlautomatedlmessaginglsolution.lTheylwilllimplementlw
ebhooksltolsendlautomatedlmessageslfromlapplicationsltolotherlapplicationslwhenlcertainlevent
sloccur.l
Thelengineerlcanlextendlthelfunctionalityloflmanylsecurityltoolslwithladd-
ons.lInlthislcase,lthelengineerluseslanlout-of-the-boxlsolutionlforlthelrequiredlneed.l
Anlapplicationlprogramminglinterfacel(API)lislalsetloflfunctionslandlprocedureslthatlallowltwol
orlmorelapplicationsltolintegrate.lThelengineerlwillluselbuilt-inlfunctionalitylinlthislcase.l
Pluginslareladditionslthatlhelpltoltailorlalsoftwarelproductltolmatchlrequirementslmorelclosely.lI
nlthislcase,lthelengineerlwillluselbuilt-inlfunctionality.l



Q:lAlnewlsoftwareldevelopmentlorganizationllooksltolprovidelalsecuritylsolutionlforlanlexisti
nglsecuritylproduct.lInldoinglso,ldeveloperslatlthelorga-
lnizationlutilizelwhichltechnologylfromlthelexistinglproduct'sltoolkitltolprovidelanlintegratedlso
lution?
A.lSOARlB.lSOClC.lSIEMlD.lAPI

Answer:
lD.lAPI
Anlapplicationlprogramminglinterfacel(API)lislalsetloflfunctionslandlprocedureslthatlallowltwol
orlmorelapplicationsltolintegrate.lDeveloperslcanluselthelexistinglproduct'sltoolkitlforlintegratio
n.l
Securitylorchestration,lautomation,landlresponsel(SOAR)lislalprocessloflusingltechnologyltolaut
omatelidentifying,lanalyzing,landlrespondingltolsecuritylthreats.lUsinglSOARldoeslnotlapplylto
ldevelopers.l
Securityloperationslcentersl(SOC)larelintegralltolthelsuccessloflanlorganization'slinformationlse
curitylprogram.lUtilizinglalSOClwilllnotlhelpltheldeveloperslachieveltheirlgoals.l
Securitylinformationlandleventlmanagementl(SIEM)lautomateslthelcollection,lanalysis,landlresp
onseltolsecurity-relatedldata.lTheluseloflalSIEMlwilllnotlbeloflhelpltoltheldevelopers.l



Q:lAllocallcitylcouncilltaskedlitslInformationlTechnologyl(IT)ldepartmentltolimplementlanlint
ernational-

, scalelcybersecuritylframework.lThelrequirementlislcominglfromltheirlcyberlsecuritylinsurancelv
endor.lThelvendorlwarned
l
thatlthislsetloflframeworkslislnotlfreelylavailable.lWhichlindustrylframeworklshouldlthelITldep
artmentlinvestigate?
A.lCISlB.lPCIlDSSlC.lOWASPlD.lISO

Answer:
lD.lISO
ThelInternationallOrganizationlforlStandardizationl(ISO)lmanageslandlpublisheslalcybersecurity
lframeworklcalledlISOl27k.lObtaininglthelISOl27001lstandardlislnotlfreeloflcharge.l
ThelCenterlforlInternetlSecurityl(CIS)lbenchmarkslarelalsetloflsecuritylconfigurationlbestlpracti
ces.lTheylprovidelalsecurelbaselinelconfigurationlforlvariousloperatinglsystems,lapplications,lan
dlhardwareldevices.l
PaymentlCardlIndustrylDatalSecuritylStandardl(PCIlDSS)lislalgloballdatalprotectionlstandardle
stablishedlandlmaintainedlbylalconsortiumloflpaymentlcardlcompanies.lPCIlDSSlidentifieslcont
rolsldesignedltolpreventlfraud,lprotectlcredit,landldebitlcardldata.l
ThelOpenlWeblApplicationlSecuritylProjectl(OWASP)lislalnonprofitlfoundation.lOWASPlislanl
internationallorganizationlthatlprovideslunbiased,lpracticallinforma-
ltionlaboutlapplicationlsecurity.l



Q:lAlboutiquelcraftslcompanylwouldllikeltolsetluplalnewleCommercelwebsite.lTheylarelcheck
ingloutlvendorslwholhavelputlalhighllevellofldetaillinlthelsecuri-
ltylpracticeslandlimplementation.lTheylwantltoltestlalspecificlvendor'slsystemltolverifylthatlitlis
lnotlvulnerableltolmaliciouslactorslinjectinglmalformedldatalintolthelcheckoutlprocess.lWhichlk
indloflscanlorltestlcanlthelcompanylrunlwithlpermission?
A.lBaselinelscanlB.lMaplscanlC.lFuzzing
D.lInternallscan

Answer:
lC.lFuzzing
Fuzzinglislanlunknownlenvironmentltestinglmethodlusinglspecialtylsoftwareltoolsldesignedltoli
dentifylproblemslandlissueslwithlanlapplicationlbylinjectinglmalformedldatalintolit.l



Q:lAlvideolproductionlcompanylhaslalserverlfarmlwithlgraphicslcardslthatlallowslthelcompan
yltolgeneratelcomputer-generatedlimagery.lAlthoughlthe
l
serversldolnotlcurrentlylstorelanyldatalandlarelnotlexpensive,lthelcompanylwantsltolensurelthels
ecurityloflitslequipment.lWhatlislalcompellinglreasonlwhylthelcompanylshouldlbelproactivelinl
preventinglserverlvulnerabilities?lA.lExploitability

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
nurse_steph Rasmussen College
View profile
Follow You need to be logged in order to follow users or courses
Sold
9394
Member since
5 year
Number of followers
5141
Documents
7587
Last sold
2 hours ago
Exams, Study guides, Reviews, Notes

All study solutions.

3.9

1682 reviews

5
846
4
297
3
259
2
78
1
202

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions