engineering wgu cybersecurity
architecture and engineering
(kfo1/d488) –Question Study Guide with
Answers & Full Explanations | PDF. –
Question Study Guide with Answers &
Full Explanations | PDF.
Question 1: Data Types & Calculations
• Which data type should be used to calculate 90% of the retail price of an
• Question
item?
• A. Floating-point
B. String
• Options
C. Boolean
D. Auto-number
• Correct
• A. Floating-point
Answer
• A floating-point data type is required for precise calculations that involve
• Explanation decimals, like calculating a percentage of a price. It can accurately represent
the fractional part of a number, which is essential for this task.
,Question 2: Network Security & Segmentation
Which type of security should a business use on its layer 2 switch to isolate the finance
Question
network from other departmental networks?
A. Virtual Private Network (VPN)
B. Internet Protocol Security (IPSec)
Options
C. Virtual Local Area Network (VLAN)
D. Remotely Triggered Black Hole (RTBH)
Correct
C. Virtual Local Area Network (VLAN)
Answer
VLANs allow a network administrator to logically segment a network at Layer 2, creating
distinct broadcast domains. This isolates traffic from different departments (like finance)
Explanation
without needing separate physical switches, ensuring they cannot communicate directly
unless routed through a Layer 3 device.
Question 3: Risk Management & Access Control
A company has recently experienced a data breach from an insider threat. The insider
accessed sensitive information stored in the administrator account from their user
Question
account. The insider was not in a supervisory role. Which policy should the company
implement?
A. Password complexity
B. Separation of duties
Options
C. Least privilege
D. Job rotation
Correct
C. Least privilege
Answer
, A company has recently experienced a data breach from an insider threat. The insider
accessed sensitive information stored in the administrator account from their user
Question
account. The insider was not in a supervisory role. Which policy should the company
implement?
The principle of least privilege dictates that users should be granted only the minimum
access rights necessary to perform their job functions. In this scenario, the insider had ac
Explanation
to an administrator account they did not need, which the principle of least privilege woul
have prevented.
Question 4: Authentication & Non-Repudiation
Question What should a business use to provide non-repudiation for emails between employees?
A. TLS/SSL
B. AES-256
Options
C. S/MIME
D. IPSec
Correct
C. S/MIME (Secure/Multipurpose Internet Mail Extensions)
Answer
S/MIME provides email security through digital signatures and encryption. The digital
Explanation signature offers non-repudiation, ensuring that the sender cannot deny having sent the
message, as the signature is cryptographically tied to the sender's identity.
Question 5: Disaster Recovery Objectives
, A retail company wants to establish the frequency at which it needs to back up its critica
Question data to ensure it can be restored with the least amount of acceptable loss. What is the
term used to describe this metric?
A. Continuous data protection (CDP)
B. Business impact analysis (BIA)
Options
C. Disaster recovery (DR)
D. Recovery point objective (RPO)
Correct
D. Recovery point objective (RPO)
Answer
RPO defines the maximum acceptable age of data that must be recovered from backup
Explanation storage for normal operations to resume after a failure. It directly determines the backup
frequency; a lower RPO means more frequent backups.
Question 6: Incident Response & Threat Analysis
An engineer has noticed increased network traffic originating from an unknown internet
Question protocol (IP) address. Which action should be taken to analyze the unusual network traff
patterns?
A. Permanently block the IP address.
B. Compare the unknown address to known IP addresses to determine if it is a threat.
Options
C. Temporarily block the IP address.
D. Rate-limit the IP address.
Correct
B. Compare the unknown address to known IP addresses to determine if it is a thre
Answer
Before taking any blocking action, a proper threat analysis requires verifying whether an
Explanation
unknown IP is malicious. Comparing it against threat intelligence feeds and known IP