WGU D488 Final Exam Test Bank (Latest Update 2025 / 2026) Cybersecurity Architecture and Engineering | Questions and Answers | Grade A | 100% Correct (Verified Solutions)
Question:
A security team notices traffic coming from a country where the organization does not have any business operations. Which of the following could this be an indicator of?
- High call volume
- Odd network traffic
- Geographic anomalies
- Unauthorized changes
Answer:
- Geographic anomalies
- / 4
Question:
A forensic analyst is creating a copy of evidence. Which stage of the forensics process is this a part of?
- Identification
- Analysis
- Collection
- Presentation
Answer:
- Collection
Question:
A forensic analyst is creating a copy of a hard drive to preserve evidence for an investigation. The analyst uses hashing to ensure the integrity of the copied data. Which stage of the forensics process does this activity belong to?
- Identification
- Analysis
- Collection
- Presentation
Answer:
- Collection
- / 4
Question:
A first responder is securing a crime scene where digital evidence may be present. Their first priority is ensuring the safety of personnel on site. Which stage of the forensics process does this activity represent?
- Identification
- Analysis
- Collection
- Presentation
Answer:
- Identification
Question:
A forensic expert is tasked with interpreting data retrieved from a suspect's device, examining file structures, and identifying potential signs of tampering. Which stage of the forensics process does this activity fall under?
- Identification
- Analysis
- Collection
- Presentation
Answer:
- Analysis
- / 4
Question:
A forensic investigator is preparing a detailed report that outlines the tools used, methods applied, and the findings from an investigation. This report will be presented in court. Which stage of the forensics process is this?
- Identification
- Analysis
- Collection
- Presentation
Answer:
- Presentation
Question:
A web administrator is looking at attacks where a malicious script is inserted directly into an at-risk/vulnerable web application. What type of attack is this?
- Reflected XSS (stored cross-site scripting)
- Stored XSS (stored cross-site scripting)
- CSRF (Cross-Site Request Forgery)
- Directory Traversal
Answer:
- Stored XSS (stored cross-site scripting)
- / 4