Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Western Governors University Cybersecurity Architecture and Engineering (KFO1/D488) Complete Exam Study Guide 2026 Edition

Beoordeling
-
Verkocht
-
Pagina's
84
Cijfer
A+
Geüpload op
30-03-2026
Geschreven in
2025/2026

Western Governors University Cybersecurity Architecture and Engineering (KFO1/D488) Complete Exam Study Guide 2026 Edition

Instelling
Cybersecurity
Vak
Cybersecurity

Voorbeeld van de inhoud

Western Governors University

Cybersecurity Architecture and Engineering
(KFO1/D488)

Complete Exam Study Guide
2026 Edition




About This Resource

This comprehensive study guide contains 200 verified questions and detailed
rationales covering all major content areas for the WGU KFO1/D488 Cybersecurity
Architecture and Engineering exam. This course focuses on designing, implementing,
and managing security architectures, security engineering principles, and enterprise
security solutions aligned with industry frameworks and best practices.

Course Objectives Covered:

• Security Architecture Design and Implementation
• Security Engineering Principles
• Enterprise Security Solutions
• Risk Management and Compliance
• Security Operations and Monitoring
• Identity and Access Management
• Network Security Architecture
• Cloud Security Engineering

, SECTION 1: SECURITY ARCHITECTURE PRINCIPLES AND
FRAMEWORKS
*(Questions 1-30)*




1. Which security architecture framework provides a comprehensive approach to
aligning security with business strategy and risk management?

• A) TOGAF
• B) SABSA
• C) Zachman Framework
• D) COBIT

Answer: B) SABSA

Expert Rationale: SABSA (Sherwood Applied Business Security Architecture) is a
business-driven security architecture framework that focuses on aligning security
with business objectives. It provides a comprehensive methodology for developing
security architectures based on risk management .




2. The Open Group Architecture Framework (TOGAF) is primarily used for:

• A) Security-specific architecture only
• B) Enterprise architecture development
• C) Cloud security implementation
• D) Incident response planning

Answer: B) Enterprise architecture development

Expert Rationale: TOGAF is a framework for enterprise architecture that provides
a comprehensive approach to designing, planning, implementing, and governing
enterprise information architecture. It includes security considerations but is not
exclusively security-focused .

, 3. In the context of security architecture, "defense in depth" refers to:

• A) A single layer of strong security controls
• B) Multiple layers of security controls throughout the IT infrastructure
• C) Physical security only
• D) Perimeter security only

Answer: B) Multiple layers of security controls throughout the IT
infrastructure

Expert Rationale: Defense in depth is a security strategy that employs multiple
layers of security controls throughout the IT infrastructure, including physical,
network, host, application, and data layers. This ensures that if one layer is
compromised, additional layers provide protection .




4. Which security principle states that a system should maintain its security
properties even when operating in a hostile environment?

• A) Defense in depth
• B) Least privilege
• C) Fail-safe defaults
• D) Complete mediation

Answer: D) Complete mediation

Expert Rationale: Complete mediation is a security principle requiring that every
access to a resource be checked against an access control mechanism. The system
must validate all access attempts, even if previously authenticated .




5. The principle of "least privilege" requires that:

• A) Users have full administrative access
• B) Users and processes are granted only the minimum access necessary to perform
their functions
• C) All users have the same access level
• D) Access is granted based on seniority

, Answer: B) Users and processes are granted only the minimum access
necessary to perform their functions

Expert Rationale: Least privilege is a fundamental security principle that limits
access rights to the minimum necessary for users, applications, and processes to
perform their authorized functions. This reduces the attack surface and limits
potential damage from compromised accounts .




6. Which NIST SP 800-53 control family addresses security architecture and
engineering?

• A) AC (Access Control)
• B) AU (Audit and Accountability)
• C) SC (System and Communications Protection)
• D) SI (System and Information Integrity)

Answer: C) SC (System and Communications Protection)

Expert Rationale: NIST SP 800-53 SC control family focuses on system and
communications protection, including architectural considerations for boundary
protection, cryptographic mechanisms, and secure communications .




7. The ISO/IEC 27001 standard is primarily concerned with:

• A) Technical security controls
• B) Information Security Management Systems (ISMS)
• C) Network security protocols
• D) Application security testing

Answer: B) Information Security Management Systems (ISMS)

Expert Rationale: ISO/IEC 27001 specifies requirements for establishing,
implementing, maintaining, and continually improving an Information Security
Management System (ISMS). It provides a framework for managing security risks
through policies, procedures, and controls .

Geschreven voor

Instelling
Cybersecurity
Vak
Cybersecurity

Documentinformatie

Geüpload op
30 maart 2026
Aantal pagina's
84
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$21.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
AcademicsExcellence Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
156
Lid sinds
1 jaar
Aantal volgers
26
Documenten
6873
Laatst verkocht
2 dagen geleden
Academic Excellence | Study Guides & Solutions

Dear Students, We have vast range of test banks and solution manuals of all topics, If you need any solution manual, testbank for testbooks do contact us anytime, save your time and effort and let you definitely understand what you are studying and get an amazing marks as well. Contact us 24/7 :

4.4

318 beoordelingen

5
206
4
40
3
60
2
6
1
6

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen