Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D488 / KFO1 Cybersecurity Architecture & Engineering Exam Study Guide 2026: Complete Q&A with Rationales | NIST, Zero Trust, SABSA, TOGAF

Beoordeling
-
Verkocht
-
Pagina's
65
Cijfer
A+
Geüpload op
24-03-2026
Geschreven in
2025/2026

Ace the WGU Cybersecurity Architecture and Engineering (D488 / KFO1) Objective Assessment with this complete study guide! This comprehensive resource includes over 200 exam-style questions and detailed rationales covering every key topic from the WGU D488/KFO1 course. Master the concepts needed to pass your OA on the first try. What's Inside: 200+ Practice Questions: Covers the full scope of the WGU D488/KFO1 exam blueprint. Detailed Rationales: Understand the "why" behind every answer to reinforce learning. Key Topics Covered: Security Architecture Frameworks: NIST Cybersecurity Framework (CSF), SABSA, TOGAF, Zachman Framework, and ISO/IEC 27001. Security Principles: Zero Trust Architecture (ZTA), defense in depth, least privilege, separation of duties, fail secure, and economy of mechanism. Threat Modeling: STRIDE, DREAD, PASTA, and attack surface analysis. Enterprise Security Architecture: Business capability mapping, architecture roadmaps, capability maturity models, and architecture review boards (ARB). Application & Cloud Security: DevSecOps, "shift left," OWASP Top 10, SAST/DAST, container security, serverless security, CSPM, CWPP, and SASE. Network Security Architecture: Segmentation, microsegmentation, Zero Trust Network Access (ZTNA), SD-WAN, NGFW, IDS/IPS, and industrial control system (ICS) security (Purdue Model). Identity & Access Management (IAM): AAA framework, MFA, RBAC, ABAC, PAM, identity federation (SAML/OIDC), and identity lifecycle management. Risk Management & Compliance: NIST RMF, inherent vs. residual risk, risk treatment, KPIs/KRIs, GDPR, HIPAA, PCI DSS, SOC 2, and FedRAMP. Perfect for WGU students in the Cybersecurity program. Study with confidence and pass your D488/KFO1 exam using this ultimate guide!

Meer zien Lees minder
Instelling
WGU D488
Vak
WGU D488

Voorbeeld van de inhoud

Cybersecurity Architecture and Engineering
(KFO1/D488) – WGU 2026 Complete Question
Study Guide with Rationale


Section 1: Security Architecture Frameworks and Principles (Questions 1-40)
1. The NIST Cybersecurity Framework (CSF) consists of five core functions.
Which of the following is NOT one of these functions?
A. Identify
B. Protect
C. Detect
D. Audit
E. Respond
F. Recover
Answer: D. Audit
Rationale: The NIST CSF core functions are Identify, Protect, Detect,
Respond, and Recover. Audit is not a core function but rather a control
activity that spans multiple functions. The framework provides a common
language for managing cybersecurity risk .
2. Which NIST Cybersecurity Framework function involves developing and
implementing appropriate safeguards to ensure delivery of critical services?
A. Identify
B. Protect
C. Detect
D. Respond
Answer: B. Protect
Rationale: The Protect function supports the ability to limit or contain the
impact of a potential cybersecurity event. It includes identity management

,and access control, awareness training, data security, and protective
technology .
3. In the SABSA framework, which layer addresses the business requirements
and defines the business drivers?
A. Contextual Architecture
B. Conceptual Architecture
C. Logical Architecture
D. Physical Architecture
Answer: A. Contextual Architecture
Rationale: SABSA (Sherwood Applied Business Security Architecture) uses a
layered approach. The Contextual Architecture layer addresses business
requirements, defining the business context, drivers, and objectives that
drive security architecture decisions .
4. The TOGAF Architecture Development Method (ADM) includes all of the
following phases EXCEPT:
A. Architecture Vision
B. Business Architecture
C. Technology Architecture
D. Security Implementation
Answer: D. Security Implementation
Rationale: TOGAF ADM phases include Architecture Vision, Business
Architecture, Information Systems Architecture, Technology Architecture,
Opportunities and Solutions, Migration Planning, Implementation
Governance, and Change Management. Security is embedded throughout .
5. Which security architecture framework is specifically designed for
information security and is based on a six-layer model?
A. TOGAF
B. Zachman Framework
C. SABSA
D. COBIT

,Answer: C. SABSA
Rationale: SABSA (Sherwood Applied Business Security Architecture) is
specifically designed for information security architecture. It uses a six-layer
model: contextual, conceptual, logical, physical, component, and operational
.
6. The Zachman Framework for Enterprise Architecture is organized by:
A. Six layers of abstraction
B. Five core functions
C. Six interrogatives (what, how, where, who, when, why) and five rows of
perspectives
D. Four domains of architecture
Answer: C. Six interrogatives (what, how, where, who, when, why) and five
rows of perspectives
Rationale: The Zachman Framework uses six interrogatives (what, how,
where, who, when, why) and five rows representing different stakeholder
perspectives (executive, business management, architect, engineer,
technician) .
7. The ISO/IEC 27001 standard focuses on:
A. Information Security Management Systems (ISMS)
B. Cybersecurity Framework implementation
C. Enterprise Architecture
D. IT Service Management
Answer: A. Information Security Management Systems (ISMS)
Rationale: ISO/IEC 27001 is an international standard that specifies
requirements for establishing, implementing, maintaining, and continually
improving an Information Security Management System (ISMS) .
8. Which of the following is a primary principle of Zero Trust Architecture?
A. Trust but verify
B. Perimeter-based security
C. Never trust, always verify
D. Defense in depth

, Answer: C. Never trust, always verify
Rationale: Zero Trust Architecture is based on the principle of "never trust,
always verify." It assumes no implicit trust for any user, device, or network
location, requiring continuous verification for all access requests .
9. In Zero Trust Architecture, the three primary components are:
A. Firewall, IDS, VPN
B. Policy Enforcement Point (PEP), Policy Decision Point (PDP), and Policy
Administrator
C. Perimeter, DMZ, Internal Network
D. Identity, Device, Network
Answer: B. Policy Enforcement Point (PEP), Policy Decision Point (PDP),
and Policy Administrator
Rationale: Zero Trust architecture components include the Policy
Enforcement Point (where access is enforced), the Policy Decision Point
(where access decisions are made), and the Policy Administrator (which
manages policies and communicates decisions) .
10. Which security control is designed to prevent unauthorized access to
resources while allowing authorized access?
A. Deterrent control
B. Preventive control
C. Detective control
D. Corrective control
Answer: B. Preventive control
Rationale: Preventive controls are designed to prevent security incidents
before they occur. Examples include firewalls, access controls, encryption,
and authentication mechanisms .
11. The principle of "defense in depth" refers to:
A. A single, impenetrable security control
B. Multiple layers of security controls throughout the IT system
C. Focusing security efforts on the perimeter
D. Relying on physical security only

Geschreven voor

Instelling
WGU D488
Vak
WGU D488

Documentinformatie

Geüpload op
24 maart 2026
Aantal pagina's
65
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$28.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
PremiumExamBank Chamberlain College Of Nursng
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
328
Lid sinds
2 jaar
Aantal volgers
65
Documenten
5451
Laatst verkocht
1 dag geleden
TEST BANKS AND ALL KINDS OF EXAMS SOLUTIONS

TESTBANKS, SOLUTION MANUALS & ALL EXAMS SHOP!!!! TOP 5_star RATED page offering the very best of study materials that guarantee Success in your studies. Latest, Top rated & Verified; Testbanks, Solution manuals & Exam Materials. You get value for your money, Satisfaction and best customer service!!! Buy without Doubt..

4.8

1043 beoordelingen

5
929
4
74
3
25
2
10
1
5

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen