{"id":119500,"date":"2023-09-10T19:34:33","date_gmt":"2023-09-10T19:34:33","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=119500"},"modified":"2023-09-10T19:34:35","modified_gmt":"2023-09-10T19:34:35","slug":"wgu-c842-cyber-defense-and-counter-measures-exam-study-bundle-2023-2024-complete-packageverified","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/09\/10\/wgu-c842-cyber-defense-and-counter-measures-exam-study-bundle-2023-2024-complete-packageverified\/","title":{"rendered":"WGU C842 Cyber Defense and Counter Measures EXAM STUDY BUNDLE 2023 &#8211; 2024 (COMPLETE PACKAGE)(Verified)"},"content":{"rendered":"\n<p>1 \/<br>WGU C842 Cyber Defense and Counter Measures Tool1.incident handling response steps: 1. Preparation<br>2.Incident Recording<br>3.Incident Triage<br>4.Notification<br>5.Containment<br>6.Evidence Gathering and Forensic Analysis<br>7.Eradication<br>8.Recovery<br>9.Post-Incident ActivitiesIncident DocumentationIncident Impact<br>Assessment- Review and<br>Revise Policies- Close the<br>Investigation- Incident<br>Disclosure<br>2.Risk Assessment Management tools: PILAR &#8211; It helps incident handlers<br>to assess risks against critical assets of the organization in several<br>dimensions such as confidentiality, integrity, availability, authenticity,<br>and accountability<\/p>\n\n\n\n<p>2 \/<br>A1 Tracker<br>Risk Management Studio<br>3.Tools for Incident Analysis and Validation: buck-security &#8211; allows<br>incident handlers to identify the security status of a system. It gives<br>an overview of the security status of the system within a couple of<br>minutes<br>kiwi syslog server &#8211; It allows you to centrally manage syslog messages,<br>generates real-time alerts based on syslog messages, and perform<br>advanced message filtering and message buffering<br>splunk light &#8211; It is a tool for collecting, monitoring, and analyzing log filefrom servers, applications, or other sources<br>\u00aa Loggly (https:\/\/www.loggly.com) \u00aa InsightOps<br>(https:\/\/www.rapid7.com) \u00aa Logz.io (https:\/\/www.logz.io) \u00aa<br>Logmatic.io (https:\/\/www.logmatic.io) \u00aa Graylog<br>(https:\/\/www.graylog.org<br>4.Tools for Detecting Missing Security Patches: Microsoft Baseline<br>Security Analyzer &#8211; MBSA lets incident handlers scan local and remote<br>systems for missing security updates as well as common security<br>misconfigurations<\/p>\n\n\n\n<p>3 \/<br>\u00aa GFI LanGuard (https:\/\/www.gfi.com)<br>\u00aa Symantec Client Management Suite<br>(https:\/\/www.symantec.com) \u00aa MaaS360 Patch Analyzer<br>(https:\/\/www.ibm.com)<br>\u00aa Solarwinds Patch Manager (https:\/\/www.solarwinds.com)<br>\u00aa Kaseya Security Patch Management<br>(https:\/\/www.kaseya.com) \u00aa Software Vulnerability<br>Manager (https:\/\/www.flexera.com)<br>\u00aa Ivanti Endpoint Security (https:\/\/www.ivanti.com)<br>\u00aa Patch Connect Plus (https:\/\/www.manageengine.com) \u00aa Automox<br>(https:\/\/www.au- tomox.com)<br>\u00aa Prism Suite (https:\/\/www.newboundary.co<br>5.report writing tools: MagicTree &#8211; stores data in a tree structure<br>This is a natural way of representing the information that is gathered<br>during a network test: a host has ports, which have services,<br>applications, vulnerabilities, etc.<br>KeepNote &#8211; is used to store class notes, TODO lists, research notes,<br>journal entries, paper outlines, etc. in a simple notebook hierarchy with<br>rich-text formatting, images, and more<br>6.data imaging tools: FTK imager &#8211; It is a data preview and imaging tool<br>that enables analysis of files and folders on local hard drives,<br>CDs\/DVDs, and network drives<br>R-Drive image &#8211; buck-security allows incident handlers to identifying<\/p>\n\n\n\n<p>4 \/<br>the security status of a system. It gives an overview of the security<br>status of the system within a couple of minutes<br>\u00aa EnCase Forensic (https:\/\/www.guidancesoftware.com) \u00aa Data<br>Acquisition Tool- box (https:\/\/in.mathworks.com) \u00aa RAID Recovery for<br>Windows (https:\/\/www.run- time.org) \u00aa R-Tools R-Studio<br>(https:\/\/www.r-studio.com) \u00aa F-Response Imager (https:\/\/www.fresponse.com<br>7.tools for calculating hash value:<br>HashCalc MD5 Calculator<br>HashMyFiles<br>8.Collecting Volatile Information: System Information: Tools and<br>commands to collect the information: Systeminfo.exe (Windows)<br>PsInfo<br>(Windows) Cat<br>(Linux) Uname<br>(Linux)<\/p>\n\n\n\n<p>1 \/ 10<br>WGU C842 OBJECTIVE ASSESSMENT 2023<br>1.A security committee at an organization develops a security plan.<br>Numer- ous security control types are in place. The organization utilizes a<br>training program to provide best practices training to all employees. The<br>committee uses which category to define the program ANS Operational<br>2.Too often, employees use the datacenter for overflow storage of office<br>sup- plies. Management uses warning signs to prevent employees from<br>entering a datacenter. Management has implemented which control type to<br>tighten security ANS Physical<br>3.It is important to assess sources when adding information to a data<br>set. Considering threat intelligence, this data is likely to derive from<br>external sources. Which factor is key in disseminating updates ANS<br>Relevancy<br>4.Numerous energy companies experience cyber attacks in a short period<br>of time. Analysts that investigate the attacks categorize the threats as<br>coming from which actor type ANS Nation-state<\/p>\n\n\n\n<p>2 \/ 10<br>5.A company abruptly terminates an employee. The employee harbors a<br>known grievance as a result of the company&#8217;s actions. Considering<br>threat types, which two classify the ex-employee? Select all that apply<br>ANS Insider Outsider<br>6.Engineers analyze previous hacks and intrusions to produce definitions<br>of the tactics, techniques, and procedures (TTP) used to perform attacks.<br>When evaluating data, the engineers classify which attack based on the<br>behavior of increased network traffic ANS Data exfiltration<br>7.Threat intelligence reveals a new type of malware is infecting Windows<br>desktops in many companies. Security specialists at a company initiate<br>threat hunting activities to investigate a potential infection. Which areas<br>do the engineers investigate in implementing the hunt? Select all that<br>apply ANS &#8211; Network traffic<br>Process Lists<br>8.A systems engineer at an organization tightens security by enabling<br>sandboxing on a crucial system. This measure is in place to help prevent<br>ransomware. Which valid features does the engineer enable on the<br>system? Select all that apply ANS Monitor network sockets<br>Periodic snapshots<\/p>\n\n\n\n<p>3 \/ 10<br>9.In contrast to traditional packet sniffing, Zeek, a packet capture tool,<br>offers which benefits? Select all that apply ANS Log only data of potential<br>interests Reduce storage requirements<\/p>\n\n\n\n<p>1 \/ 25<br>WGU C842 \u2013 Cyber Defense and Counter Measures TEST<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Which of the following information security elements ensures that the<br>information is accessible only to those who are authorized to have<br>access?<br>A authenticity<br>B confidentiality<br>C integrity<br>D availability ANS : B<\/li>\n\n\n\n<li>Identify the information security element that determines<br>trustworthiness of data or resources in terms of preventing improper and<br>unauthorized changes.<br>A integrity<br>B availability<br>C authenticity<br>D non-repudiation ANS : A<\/li>\n\n\n\n<li>John, a security professional working for Xdoc Corporation, is implementing a security strategy that uses multilayered protection throughout<br>an information system to help minimize any adverse impact from attacks<\/li>\n<\/ol>\n\n\n\n<p>2 \/ 25<br>on organizational assets.<br>Identify the security strategy John has implemented.<br>A covert channel<br>B defense-in-depth<br>C likelihood analysis<br>D three-way handshake ANS : B<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li>Identify the security policy that doesn&#8217;t keep any restrictions on the<br>usage of system resources.<br>A promiscuous<br>policy B prudent<br>policy<br>C paranoid policy<br>D permissive policy ANS : A<\/li>\n\n\n\n<li>Carl is trying to violate the acceptable use of a network and computer<br>use policy. Under which category of the incident handling criteria does<br>this scenario fall?<\/li>\n<\/ol>\n\n\n\n<p>3 \/ 25<br>A CAT 4<br>B CAT 2<br>C CAT 1<br>D CAT 3 ANS : A<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"6\">\n<li>In which of the following stages of incident handling does<br>classification and prioritization of incidents take place?<br>A incident recording and<br>assignment B incident containment<br>C post-incident activities<br>D incident triage ANS : D<\/li>\n\n\n\n<li>Which of the following terms reflects an organization&#8217;s mid-term<br>and long-term goals for incident management capabilities?<br>A IH&amp;R team models<br>B IH&amp;R mission<br>C IH&amp;R staffing<br>D IH&amp;R vision<br>ANS : D<\/li>\n\n\n\n<li>Which of the following terms defines the purpose and scope of the<br>planned incident handling and response capabilities?<\/li>\n<\/ol>\n\n\n\n<p>4 \/ 25<br>A IH&amp;R mission<br>B IH&amp;R staffing<br>C IH&amp;R team models<br>D IH&amp;R vision ANS :<br>A<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"9\">\n<li>Which of the following backup strategies provides daily status of the<br>backup situation, such as successful, unsuccessful, not run, out of<br>space, etc.?<br>A security<br>B guarantee<br>C data<br>availability D<br>notifications ANS<br>: D<\/li>\n\n\n\n<li>John is an incident response manager at XYZ Inc. As a part of IH&amp;R<br>policy of his organization, he signed a contract between the organization<br>and a third-party insurer to protect organization individuals from different<br>threats and risks.<\/li>\n<\/ol>\n\n\n\n<p>1 \/<br>WGU C842 Cyber Defense and Counter Measures Tool1.incident handling response steps: 1. Preparation<br>2.Incident Recording<br>3.Incident Triage<br>4.Notification<br>5.Containment<br>6.Evidence Gathering and Forensic Analysis<br>7.Eradication<br>8.Recovery<br>9.Post-Incident ActivitiesIncident DocumentationIncident Impact<br>Assessment- Review and<br>Revise Policies- Close the<br>Investigation- Incident<br>Disclosure<br>2.Risk Assessment Management tools: PILAR &#8211; It helps incident handlers<br>to assess risks against critical assets of the organization in several<br>dimensions such as confidentiality, integrity, availability, authenticity,<br>and accountability<\/p>\n\n\n\n<p>2 \/<br>A1 Tracker<br>Risk Management Studio<br>3.Tools for Incident Analysis and Validation: buck-security &#8211; allows<br>incident handlers to identify the security status of a system. It gives<br>an overview of the security status of the system within a couple of<br>minutes<br>kiwi syslog server &#8211; It allows you to centrally manage syslog messages,<br>generates real-time alerts based on syslog messages, and perform<br>advanced message filtering and message buffering<br>splunk light &#8211; It is a tool for collecting, monitoring, and analyzing log filefrom servers, applications, or other sources<br>\u00aa Loggly (https:\/\/www.loggly.com) \u00aa InsightOps<br>(https:\/\/www.rapid7.com) \u00aa Logz.io (https:\/\/www.logz.io) \u00aa<br>Logmatic.io (https:\/\/www.logmatic.io) \u00aa Graylog<br>(https:\/\/www.graylog.org<br>4.Tools for Detecting Missing Security Patches: Microsoft Baseline<br>Security Analyzer &#8211; MBSA lets incident handlers scan local and remote<br>systems for missing security updates as well as common security<br>misconfigurations<\/p>\n\n\n\n<p>3 \/<br>\u00aa GFI LanGuard (https:\/\/www.gfi.com)<br>\u00aa Symantec Client Management Suite<br>(https:\/\/www.symantec.com) \u00aa MaaS360 Patch Analyzer<br>(https:\/\/www.ibm.com)<br>\u00aa Solarwinds Patch Manager (https:\/\/www.solarwinds.com)<br>\u00aa Kaseya Security Patch Management<br>(https:\/\/www.kaseya.com) \u00aa Software Vulnerability<br>Manager (https:\/\/www.flexera.com)<br>\u00aa Ivanti Endpoint Security (https:\/\/www.ivanti.com)<br>\u00aa Patch Connect Plus (https:\/\/www.manageengine.com) \u00aa Automox<br>(https:\/\/www.au- tomox.com)<br>\u00aa Prism Suite (https:\/\/www.newboundary.co<br>5.report writing tools: MagicTree &#8211; stores data in a tree structure<br>This is a natural way of representing the information that is gathered<br>during a network test: a host has ports, which have services,<br>applications, vulnerabilities, etc.<br>KeepNote &#8211; is used to store class notes, TODO lists, research notes,<br>journal entries, paper outlines, etc. in a simple notebook hierarchy with<br>rich-text formatting, images, and more<br>6.data imaging tools: FTK imager &#8211; It is a data preview and imaging tool<br>that enables analysis of files and folders on local hard drives,<br>CDs\/DVDs, and network drives<br>R-Drive image &#8211; buck-security allows incident handlers to identifying<\/p>\n\n\n\n<p>4 \/<br>the security status of a system. It gives an overview of the security<br>status of the system within a couple of minutes<br>\u00aa EnCase Forensic (https:\/\/www.guidancesoftware.com) \u00aa Data<br>Acquisition Tool- box (https:\/\/in.mathworks.com) \u00aa RAID Recovery for<br>Windows (https:\/\/www.run- time.org) \u00aa R-Tools R-Studio<br>(https:\/\/www.r-studio.com) \u00aa F-Response Imager (https:\/\/www.fresponse.com<br>7.tools for calculating hash value:<br>HashCalc MD5 Calculator<br>HashMyFiles<br>8.Collecting Volatile Information: System Information: Tools and<br>commands to collect the information: Systeminfo.exe (Windows)<br>PsInfo<br>(Windows) Cat<br>(Linux) Uname<br>(Linux)<\/p>\n\n\n\n<p>1 \/ 15<br>C842 Cyber Defense and Counter measures EC Council CertifiedIncident Handler CIH Tools and Commands<br>1.PILAR: Risk analysis and Management tool<br>2.Pilar: Assess risk against critical assets. Qualitative and quantitative.<br>Generate risk assessment reports<br>3.Group Policy Management console: Security policy Tools<br>4.Manageengine \u2026 plus: Ticketing system Tools<br>5.Alien vault: Ticketing system Tools<br>6.Busk-security: Incident analysis and validation Tools<br>7.Busk-security: Collection of security checks for Linux. Identify securitystatus.<br>8.kiwi syslog: Incident analysis and validation Tools<br>9.Splunk light: Incident analysis and validation Tools<br>10.kiwi syslog: message Management tool across servers and network<\/p>\n\n\n\n<p>2 \/ 15<br>devices. Syslog messages, SNMP traps, event log, real time<br>11.Splunk light: Collecting monitoring analyzing low from servers<br>applications and other sources.<br>12.Microsoft Baseline Security Analyzer (MBSA): Tools for detecting<br>missing security patches<br>13.Microsoft Baseline Security Analyzer (MBSA): Determine security<br>State. Scan for missing patches and misconfigs.<br>14.Magic tree: Report writing tools<br>15.Keepnote: Report writing tools<br>16.FTK\u2026: Data Imaging Tools<br>17.FTK Imager: data preview and imaging tool that enables analysis of<br>files and folders on local hard drives, CDs\/DVDs, network drives, and<br>examination of the content of forensic images or memory dumps<br>18.R-Drive\u2026: Data Imaging Tools<br>19.R-Drive\u2026: provides creation of disk image files for backup or<br>duplication purposes. restores the images on the original disks, on<br>any other partitions, or even on a hard drive&#8217;s free space. one can<\/p>\n\n\n\n<p>3 \/ 15<br>restore the system after heavy data loss caused by an operating<br>system crash, virus attack, or hardware failure<br>20.\u00b7 EnCase Forensic<br>Data Acquisition<br>Toolbox<br>\u00b7 RAID Recovery for Windows<\/p>\n\n\n\n<p>4 \/ 15<br>\u00b7 R-Tools R-Studio<br>F-Response Imager: Data Imaging Tools<br>21.HashCalc: Image Integrity Tools<br>22.HashCalc: compute multiple hashes, checksums, and HMACs for<br>files, text, and hex strings.<br>23.MD5 Calculator: Image Integrity Tools<br>24.MD5 Calculator: calculating the MD5 hash value of the selected file<br>25.HashMyFiles: Image Integrity Tools<br>26.HashMyFiles: small utility that allows to calculate the MD5 and<br>SHA1 hashes of one or more files in the system. It allows copying of<br>the MD5\/SHA1 hashes list into the clipboard or save them into<br>text\/html\/xml file<br>27.PsUptime (Windows): \u00b7 Shows system uptime<br>28.Net Statistics (Windows): \u00b7 Shows system uptime<br>29.Uptime and W (Linux): \u00b7 Shows system uptime<br>30.Netstat -ab (Windows): determine all the executable files for running<br>process- es<\/p>\n\n\n\n<p>1 \/<br>107<br>WGU C842 \u2013 Cyber Defense and Counter Measures<br>TEST BANK 2023<br>1.Which of the following information security elements ensures that the<br>information is accessible only to those who are authorized to have<br>access?<br>A authenticity<br>B confidentiality<br>C integrity<br>D availability: B<br>2.Identify the information security element that determines<br>trustworthiness of data or resources in terms of preventing improper and<br>unauthorized changes.<br>A integrity<br>B availability<br>C authenticity<br>D non-repudiation: A<br>3.John, a security professional working for Xdoc Corporation, is imple-<\/p>\n\n\n\n<p>2 \/<br>107<br>menting a security strategy that uses multilayered protection throughout<br>an information system to help minimize any adverse impact from attacks<br>on organizational assets.<br>Identify the security strategy John has implemented.<br>A covert channel<br>B defense-in-depth<br>C likelihood analysis<br>D three-way handshake: B<br>4.Identify the security policy that doesn&#8217;t keep any restrictions on the<br>usage of system resources.<br>A promiscuous policy<br>B prudent policy<br>C paranoid policy<br>D permissive policy: A<br>5.Carl is trying to violate the acceptable use of a network and computer<br>use policy. Under which category of the incident handling criteria does<br>this scenario fall?<\/p>\n\n\n\n<p>3 \/<br>107<br>A CAT 4<br>B CAT 2<br>C CAT 1<br>D CAT 3: A<br>6.In which of the following stages of incident handling does<br>classification and prioritization of incidents take place?<br>A incident recording and assignment<br>B incident containment<br>C post-incident activities<br>D incident triage: D<br>7.Which of the following terms reflects an organization&#8217;s mid-term<br>and long-term goals for incident management capabilities?<br>A IH&amp;R team models<br>B IH&amp;R mission<br>C IH&amp;R staffing<br>D IH&amp;R vision: D<br>8.Which of the following terms defines the purpose and scope of the<br>planned incident handling and response capabilities?<\/p>\n\n\n\n<p>4 \/<br>107<br>A IH&amp;R mission<br>B IH&amp;R staffing<br>C IH&amp;R team models<br>D IH&amp;R vision: A<br>9.Which of the following backup strategies provides daily status of the<br>backup situation, such as successful, unsuccessful, not run, out of<br>space, etc.?<br>A security<br>B guarantee<br>C data availability<br>D notifications: D<br>10.John is an incident response manager at XYZ Inc. As a part of IH&amp;R<br>policy of his organization, he signed a contract between the organization<br>and a third-party insurer to protect organization individuals from different<br>threats<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1 \/WGU C842 Cyber Defense and Counter Measures Tool1.incident handling response steps: 1. Preparation2.Incident Recording3.Incident Triage4.Notification5.Containment6.Evidence Gathering and Forensic Analysis7.Eradication8.Recovery9.Post-Incident ActivitiesIncident DocumentationIncident ImpactAssessment- Review andRevise Policies- Close theInvestigation- IncidentDisclosure2.Risk Assessment Management tools: PILAR &#8211; It helps incident handlersto assess risks against critical assets of the organization in severaldimensions such as confidentiality, integrity, availability, authenticity,and accountability [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-119500","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/119500","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=119500"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/119500\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=119500"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=119500"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=119500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}