WGU D488 FINAL EXAM D488-CYBERSECURITY
ARCHITECTURE AND ENGINEERING ACTUAL EXAM
WITH 450+ QUESTIONS AND DETAILED ANSWERS
THE LATEST UPDATED EXAM BANK INCLUDING
EXPERT VERIFIED SOLUTIONS FOR A SURE PASS
A systems security engineer deploys several new workstations in an organization.
While doing so, a hardware security module (HSM) is also deployed for security
services. What solution has the engineer provided by utilizing the HSM?
A. Unchangeable asymmetric private key
M
B. The use of digital certificates
ED
C. An archive and escrow for keys
D. Record the presence of unsigned kernel-level code
C. An archive and escrow for keys
ST
An organization performs a risk management exercise as it relates to server
security. Experts examine a workflow that involves the replication of files from
U
one server to another. The replication is found to not use any form of encryption
for data. The experts document this finding during which phase of the exercise?
D
A. Identification of known vulnerabilities
B. Identification of mission-critical functions
Y
C. Identification of potential threats
D. Identification of risk responses
A. Identification of known vulnerabilities
An engineer deploys a cloud access security broker (CASB) solution to mediate
access to cloud services by users across all types of devices. As the engineer
,2|P age
utilizes a forward proxy in the deployment, how is the CASB configured? (Select
all that apply.)
1. A security appliance is positioned at the client network edge that forwards
user traffic to the cloud network.
2. Systems are configured with a setting or an agent is installed.
3. An API-based CASB brokers connections between the cloud service and the
cloud consumer.
4. A proxy positioned at the cloud network edge and directs traffic to cloud
services.
M
A) 1, 2
B) 1, 3
ED
C) 1, 4
D) 2, 4
A) 1, 2
ST
Which web traffic protection method is configured on an SSL/TLS web server to
U
periodically obtain a time-stamped Online Certificate Status Protocol (OCSP)
response from the certificate authority?
D
A. Certificate Pinning
B. Certificate Stapling
Y
C. Strict Transport Security
D. Digital Signature
B. Certificate Stapling
Security experts look to implement protection methods against distributed denial-
of-service (DDoS) attacks at data facilities. Blackhole routing is implemented for
,3|P age
one of the critical systems. What have the experts achieved with this
configuration?
A. Traffic is inspected for malicious activity
B. Traffic intended for the system is dropped
C. Traffic to a system is inspected before reaching a destination
D. Rules dictate the amount of throughput
B. Traffic intended for the system is dropped
M
Systems administrators configure access to a network where each object and each
ED
subject is granted a clearance level. Which solution do the administrators
configure? (Select all that apply.)
1. Access Control List (ACL)
2. Mandatory Access Control (MAC)
ST
3. SELinux
4. SEAndroid
U
A) 1, 2, 3
B) 1, 3, 4
D
C) 2, 3, 4
D) 1, 2, 4
Y
C) 2, 3, 4
A sysadmin thinks a malicious process is preventing a service from starting on a
Windows server. In which log would the event be recorded?
A. Security
B. System
, 4|P age
C. Application
D. Forwarded
C. Application
A penetration tester performs a vulnerability assessment and analysis at a
manufacturing firm. The tester uses a packet capture utility to collect the state of an
application as it operates. What approach does the tester use to collect information,
even if it is encrypted?
M
A. Reverse engineering
B. Dynamic analysis
ED
C. Side-channel analysis
D. Static analysis
C. Side-channel analysis
ST
U
Security experts perform forensic activities on a compromised server. Two of the
experts perform repeatable methods on data using the same software tools during
the investigation. By doing so, the experts utilize best practices during which
D
investigative phase?
A. Identification
Y
B. Collection
C. Reporting
D. Analysis
D. Analysis