WGU Cybersecurity Architecture and Engineering (D488) 온라인 연습
최종 업데이트 시간: 2025년12월09일
당신은 온라인 연습 문제를 통해 WGU Cybersecurity Architecture and Engineering 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.
시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 Cybersecurity Architecture and Engineering 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 68개의 시험 문제와 답을 포함하십시오.
정답:
Explanation:
The correct answer is C ― Least privilege.
According to the WGU Cybersecurity Architecture and Engineering (KFO1 / D488) course material, the principle of least privilege ensures that users are granted only the minimum level of access required to perform their job functions. In this case, if the insider only had access to resources necessary for their user role, they would not have been able to access sensitive administrative information.
Password complexity (A) strengthens account security but does not prevent excessive access. Separation of duties (B) divides critical tasks but is not solely about limiting access. Job rotation (D) moves employees between roles but is not an access control measure.
Reference Extract from Study Guide:
"The principle of least privilege requires limiting user access rights to the minimum necessary to perform their tasks, reducing the risk of insider threats and unauthorized access to sensitive information."
― WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Access Control Principles
정답:
Explanation:
The correct answer is C ― Assess.
As per WGU Cybersecurity Architecture and Engineering (KFO1 / D488) materials, after risks have been identified, the next step in the risk management life cycle is to assess them. Assessment involves analyzing and prioritizing the risks based on their potential impact and likelihood. Only after assessment can proper strategies be formulated for controlling and mitigating the risks.
Identification (A) occurs before assessment, while reviewing (B) and controlling (D) happen later in the process.
Reference Extract from Study Guide:
"Following the identification of risks, the risk management process proceeds to risk assessment, where risks are analyzed and prioritized based on likelihood and impact to guide mitigation efforts."
― WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Risk Management Process
정답:
Explanation:
The correct answer is B ― Avoid.
WGU Cybersecurity Architecture and Engineering (KFO1 / D488) materials explain that risk avoidance involves eliminating the source of risk entirely. In this scenario, by decommissioning the vulnerable website and starting anew, the organization is removing the risky environment instead of trying to fix or transfer the risk, which is a clear example of risk avoidance.
Accepting (A) would mean tolerating the risk without action. Transferring (C) would involve shifting the risk to a third party (like insurance). Mitigating (D) would involve reducing the risk without removing the vulnerable system.
Reference Extract from Study Guide:
"Risk avoidance entails eliminating the conditions that expose the organization to a threat, thereby completely removing the associated risk."
― WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Risk Response Strategies
정답:
Explanation:
The correct answer is B ― Mandatory vacation.
According to the WGU Cybersecurity Architecture and Engineering (KFO1 / D488) coursework, mandatory vacation policies require employees to take time off, during which their duties are either paused or performed by others. This break can reveal fraudulent activities, as the original employee cannot cover up their misconduct during their absence.
Separation of duties (A) prevents a single person from controlling critical processes but is not about temporarily removing an employee. Job rotation (C) moves employees between roles regularly but doesn't enforce a break. Least privilege (D) restricts access but does not address uncovering hidden
misconduct.
Reference Extract from Study Guide:
"Mandatory vacations help detect fraudulent activities, as employee absence can expose irregularities that would otherwise remain hidden through continuous control over processes."
― WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Administrative Security Controls
정답:
Explanation:
The correct answer is A ― Unsecured wireless access points.
WGU Cybersecurity Architecture and Engineering (KFO1 / D488) explains that unauthorized logins to a WLAN often indicate poorly secured wireless access points, such as those lacking strong encryption (e.g., WPA2/WPA3), not using strong passwords, or having open access without authentication. This
vulnerability can allow attackers to access internal systems and sensitive data.
Up-to-date anti-malware software (B), a strong password policy (C), and regular security training (D) are good security practices but do not directly explain unauthorized WLAN access.
Reference Extract from Study Guide:
"Unauthorized wireless access often results from unsecured wireless configurations, including weak encryption, open networks, or default credentials, posing significant risks to organizational assets."
― WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Wireless Security Concepts
정답:
Explanation:
The correct answer is D ― Establish a baseline for normal activity.
According to WGU Cybersecurity Architecture and Engineering (KFO1 / D488) materials, the first step
in threat hunting is to understand what constitutes normal behavior within the environment. Establishing a baseline allows analysts to detect anomalies and deviations that could indicate malicious activity. Without a clear understanding of normal operations, it is extremely difficult to identify potential threats.
Deploying anti-malware solutions (A) and implementing intrusion detection systems (B) are important security measures but are not the first step in proactive threat hunting. Forming an incident response team (C) is essential for handling incidents but does not directly initiate threat hunting.
Reference Extract from Study Guide:
"Threat hunting begins with establishing a baseline of normal network, system, and user activity, enabling the detection of anomalies that may indicate potential threats."
― WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Threat Hunting and Detection
정답:
Explanation:
The correct answer is B ― Log analysis.
According to WGU Cybersecurity Architecture and Engineering (KFO1 / D488) curriculum, log analysis is critical for retrospective threat hunting ― reviewing system, network, and application logs to identify signs of compromise or unauthorized activities that might have gone unnoticed in real-time. This technique helps uncover attacks that have already occurred in hybrid or cloud environments.
Honeypots (A) are proactive traps to detect future attacks. Social engineering (C) involves manipulating people, not hunting threats. Penetration testing (D) is used to find vulnerabilities, not to review past incidents.
Reference Extract from Study Guide:
"Threat hunting through log analysis involves systematically reviewing collected logs to uncover evidence of past or ongoing compromises, enabling organizations to identify and respond to threats that may have bypassed preventive controls."
― WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Threat Detection and Hunting Concepts
Of course!
Here are the verified and properly formatted answers for your next set of questions, strictly following your instructions and the WGU Cybersecurity Architecture and Engineering (KFO1 / D488) official course materials:
정답:
Explanation:
The correct answer is C ― Tampering.
WGU Cybersecurity Architecture and Engineering (KFO1 / D488) materials explain that tampering refers to unauthorized modifications of systems or data. In this case, the website being altered to redirect users to a malicious landing page indicates that an attacker has tampered with the legitimate website code or its DNS settings.
Exfiltration (A) refers to stealing data. Phishing (B) involves tricking users but not modifying a website. Ransomware (D) encrypts systems for ransom, not cause redirection.
Reference Extract from Study Guide:
"Tampering involves the unauthorized modification of a system or its resources, often to redirect users to malicious destinations or to alter functionality in harmful ways."
― WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Threat Categories and Impacts
정답:
Explanation:
The correct answer is B ― Access logs.
As outlined in the WGU Cybersecurity Architecture and Engineering (KFO1 / D488) materials, access logs record who accessed which system components, when they did so, and what changes they made. These logs are vital for creating an audit trail that can be reviewed to detect unauthorized changes to applications or systems.
NetFlow logs (A) track network traffic flows but not system or application changes. Packet capture logs (C) deal with network data but are not specialized for auditing application-level events. Router logs (D) capture network device activity, not application access information.
Reference Extract from Study Guide:
"Access logs maintain detailed records of user actions within systems and applications, providing the necessary audit trail for tracking authorized and unauthorized activities."
― WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Log Management Concepts
정답:
Explanation:
The correct answer is D ― Packet capture.
According to WGU Cybersecurity Architecture and Engineering (KFO1 / D488) content, packet captures (PCAP files) allow analysts to inspect individual network packets to understand traffic patterns, detect anomalies, and investigate attacks like DDoS. A packet capture provides complete network session data, enabling in-depth analysis of traffic behavior at the packet level.
Web server access logs (A) only capture web activity. Syslog messages (B) primarily record system events but not raw traffic data. Operating system event logs (C) focus on system-level actions, not network flows.
Reference Extract from Study Guide:
"Packet captures record the full network traffic and are essential for investigating network-based attacks such as DDoS incidents by analyzing traffic flows, protocols, and payloads."
― WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Network Security Monitoring Concepts
정답:
Explanation:
The correct answer is C ― Cyber kill chain.
The Cyber Kill Chain, developed by Lockheed Martin, is a model that breaks down a cyber attack into seven distinct phases: reconnaissance, weaponization, delivery, exploitation, installation, command and control (C2), and actions on objectives. According to the WGU Cybersecurity Architecture and Engineering (KFO1 / D488) study materials, this model helps security teams understand and interrupt an attack at various stages.
While MITRE ATT&CK (B) and its ICS variant (A) provide detailed mappings of techniques used by attackers, they are not structured specifically into seven phases like the Cyber Kill Chain. The Diamond Model (D) is an analysis methodology, not a phase-based model.
Reference Extract from Study Guide:
"The Cyber Kill Chain model divides the sequence of a cyber attack into seven phases, providing a structured method for analyzing and disrupting attacks."
― WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Attack Frameworks and Methodologies
정답:
Explanation:
The correct answer is A ― Tactical.
Based on WGU Cybersecurity Architecture and Engineering (KFO1 / D488) study material, tactical threat intelligence provides technical details such as indicators of compromise (IOCs), IP addresses, file hashes, domain names, and other evidence needed to detect and respond to threats immediately. This type of intelligence is used by security teams to perform real-time monitoring and incident response.
Operational intelligence (C) addresses campaigns or actor behavior but is not immediately actionable. Strategic intelligence (D) provides high-level, long-term threat trends. Commodity malware (B) refers to low-level malware types, not intelligence classifications.
Reference Extract from Study Guide:
"Tactical threat intelligence focuses on technical indicators of compromise (IOCs) and immediate actionable information that responders use to detect and contain active threats."
― WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Threat Intelligence Concepts
정답:
Explanation:
The correct answer is A ― Risk appetite.
As per the WGU Cybersecurity Architecture and Engineering (KFO1 / D488) coursework, risk appetite defines the amount and type of risk an organization is willing to accept in pursuit of its objectives. It is a strategic-level metric used by executive leadership and boards to determine if the current level of risk exceeds what the organization is comfortable handling.
Risk evaluation plans (B) outline how risks are assessed, treatment plans (C) describe mitigation actions, and risk tolerance (D) is more operational, defining acceptable variation from the appetite but not the overall strategic limit.
Reference Extract from Study Guide:
"Risk appetite represents the amount of risk an organization is willing to pursue or retain and is established by senior leadership as part of governance activities."
― WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Risk Management Concepts
정답:
Explanation:
The correct answer is B ― Sixteen characters with at least one letter, one number, and one symbol.
According to the WGU Cybersecurity Architecture and Engineering (KFO1 / D488) Study Guide, strong password policies must enforce a minimum length (preferably 12 to 16 characters) and require complexity, including uppercase and lowercase letters, numbers, and special characters. Sixteen-character passwords that include varied character types greatly increase the difficulty for attackers using brute-force or dictionary attacks.
Options A, C, and D either lack complexity or have too few characters, making them vulnerable to attacks.
Reference Extract from Study Guide:
"A strong password should be at least 12C16 characters long and include a mix of uppercase letters, lowercase letters, numbers, and special characters to maximize resistance to brute-force attacks."
― WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Identity and Access Management Concepts
정답:
Explanation:
The correct answer is D ― Configuring third-party authentication with Security Assertion Markup Language (SAML).
According to the WGU KFO1 / D488 Study Guide, SAML enables Single Sign-On (SSO) and federated identity across different domains by securely exchanging authentication and authorization data between an identity provider (such as an organization's Active Directory Federation Services) and a service provider (such as Azure). This allows on-premises users to log into cloud services using their existing corporate credentials.
TLS (A) provides secure communication but does not manage identity federation. 2FA (B) strengthens authentication but is not about identity federation setup. LDAP (C) is a protocol for accessing directory services, not specifically designed for federation across cloud platforms.
Reference Extract from Study Guide:
"SAML is used to implement Single Sign-On (SSO) and federated identity management, allowing organizations to extend on-premises authentication capabilities to cloud services seamlessly."
― WGU Cybersecurity Architecture and Engineering (KFO1 / D488), Identity and Access Management Concepts