Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Cybersecurity-architecture-and engineering wgu cybersecurity architecture and engineering (kfo1/d488) –Question Study Guide with Answers & Full Explanations | PDF. Question Study Guide with Answers & Full Explanations | PDF.

Rating
-
Sold
-
Pages
52
Grade
A+
Uploaded on
24-03-2026
Written in
2025/2026

Cybersecurity-architecture-and engineering wgu cybersecurity architecture and engineering (kfo1/d488) –Question Study Guide with Answers & Full Explanations | PDF. Question Study Guide with Answers & Full Explanations | PDF.

Show more Read less
Institution
3x@m
Course
3x@m

Content preview

Cybersecurity-architecture-and-
engineering wgu cybersecurity
architecture and engineering
(kfo1/d488) –Question Study Guide with
Answers & Full Explanations | PDF. –
Question Study Guide with Answers &
Full Explanations | PDF.


Question 1: Data Types & Calculations


• Which data type should be used to calculate 90% of the retail price of an
• Question
item?

• A. Floating-point
B. String
• Options
C. Boolean
D. Auto-number

• Correct
• A. Floating-point
Answer

• A floating-point data type is required for precise calculations that involve
• Explanation decimals, like calculating a percentage of a price. It can accurately represent
the fractional part of a number, which is essential for this task.

,Question 2: Network Security & Segmentation


Which type of security should a business use on its layer 2 switch to isolate the finance
Question
network from other departmental networks?

A. Virtual Private Network (VPN)
B. Internet Protocol Security (IPSec)
Options
C. Virtual Local Area Network (VLAN)
D. Remotely Triggered Black Hole (RTBH)

Correct
C. Virtual Local Area Network (VLAN)
Answer

VLANs allow a network administrator to logically segment a network at Layer 2, creating
distinct broadcast domains. This isolates traffic from different departments (like finance)
Explanation
without needing separate physical switches, ensuring they cannot communicate directly
unless routed through a Layer 3 device.




Question 3: Risk Management & Access Control


A company has recently experienced a data breach from an insider threat. The insider
accessed sensitive information stored in the administrator account from their user
Question
account. The insider was not in a supervisory role. Which policy should the company
implement?

A. Password complexity
B. Separation of duties
Options
C. Least privilege
D. Job rotation

Correct
C. Least privilege
Answer

, A company has recently experienced a data breach from an insider threat. The insider
accessed sensitive information stored in the administrator account from their user
Question
account. The insider was not in a supervisory role. Which policy should the company
implement?

The principle of least privilege dictates that users should be granted only the minimum
access rights necessary to perform their job functions. In this scenario, the insider had ac
Explanation
to an administrator account they did not need, which the principle of least privilege woul
have prevented.




Question 4: Authentication & Non-Repudiation


Question What should a business use to provide non-repudiation for emails between employees?

A. TLS/SSL
B. AES-256
Options
C. S/MIME
D. IPSec

Correct
C. S/MIME (Secure/Multipurpose Internet Mail Extensions)
Answer

S/MIME provides email security through digital signatures and encryption. The digital
Explanation signature offers non-repudiation, ensuring that the sender cannot deny having sent the
message, as the signature is cryptographically tied to the sender's identity.




Question 5: Disaster Recovery Objectives

, A retail company wants to establish the frequency at which it needs to back up its critica
Question data to ensure it can be restored with the least amount of acceptable loss. What is the
term used to describe this metric?

A. Continuous data protection (CDP)
B. Business impact analysis (BIA)
Options
C. Disaster recovery (DR)
D. Recovery point objective (RPO)

Correct
D. Recovery point objective (RPO)
Answer

RPO defines the maximum acceptable age of data that must be recovered from backup
Explanation storage for normal operations to resume after a failure. It directly determines the backup
frequency; a lower RPO means more frequent backups.




Question 6: Incident Response & Threat Analysis


An engineer has noticed increased network traffic originating from an unknown internet
Question protocol (IP) address. Which action should be taken to analyze the unusual network traff
patterns?

A. Permanently block the IP address.
B. Compare the unknown address to known IP addresses to determine if it is a threat.
Options
C. Temporarily block the IP address.
D. Rate-limit the IP address.

Correct
B. Compare the unknown address to known IP addresses to determine if it is a thre
Answer

Before taking any blocking action, a proper threat analysis requires verifying whether an
Explanation
unknown IP is malicious. Comparing it against threat intelligence feeds and known IP

Written for

Institution
3x@m
Course
3x@m

Document information

Uploaded on
March 24, 2026
Number of pages
52
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$25.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Docwayne5 walden university
Follow You need to be logged in order to follow users or courses
Sold
138
Member since
2 year
Number of followers
25
Documents
3578
Last sold
1 day ago
TEACH ME TO

I HEIP STUDENTS WITH ALL TYPE OF EXAMZ LIKE NGN,ATI,HESI,PN COMPREHENSION., FIREFIGHTER ,ECONOMICS .ENGLISH,SPANISH.MATHEMATICS .......TO SCORE A+

4.9

712 reviews

5
666
4
20
3
14
2
4
1
8

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions