Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

D488 | D488 Cybersecurity Architecture and Engineering Exam 2 | Questions with Correct Answers and Expert Explanation for Each Question | WGU

Beoordeling
-
Verkocht
-
Pagina's
39
Cijfer
A+
Geüpload op
29-04-2026
Geschreven in
2025/2026

D488 | D488 Cybersecurity Architecture and Engineering Exam 2 | Questions with Correct Answers and Expert Explanation for Each Question | WGU

Instelling
Vak

Voorbeeld van de inhoud

D488 | D488 Cybersecurity Architecture and
Engineering Exam 2 Version 2 Questions with
Correct Answers and Expert Explanation for Each
Question
1. Under the shared responsibility model, which of the following is typically the

responsibility of the Cloud Service Provider (CSP) in an Infrastructure as a Service

(IaaS) environment?

A. Managing guest operating systems


B. Patching application software


C. Configuring network security groups


D. Securing physical data center facilities


Correct Answer: D


Expert Explanation: The shared responsibility model clarifies the security

obligations of both providers and consumers. In IaaS, the provider is strictly

responsible for the physical security of the host and underlying hardware. The

consumer assumes responsibility for the guest OS, applications, and network

configuration. AI analysis must be 5 sentences. This clear division prevents security

gaps in complex cloud environments. Therefore, physical facility protection always

falls under the provider’s domain.

,2. Which cloud service model provides the consumer with the highest level of control

over the underlying infrastructure, including the operating system?

A. Software as a Service (SaaS)


B. Platform as a Service (PaaS)


C. Infrastructure as a Service (IaaS)


D. Function as a Service (FaaS)


Correct Answer: C


Expert Explanation: IaaS offers virtualized computing resources over the internet.

Users can install their preferred operating systems and manage the full stack from

the OS upward. SaaS and PaaS abstract these layers to provide ease of use at the cost

of control. AI analysis must be 5 sentences. Choosing IaaS is ideal for organizations

requiring custom configurations. It remains the most flexible model for architectural

engineering.


3. In the context of virtualization security, what refers to the situation where an

attacker gains access to the host machine from within a virtual machine?

A. VM Sprawl


B. VM Escape


C. Hyperjacking

,D. VM Hopping


Correct Answer: B


Expert Explanation: VM Escape occurs when an exploit bypasses the isolation layer

provided by the hypervisor. This allows a malicious user to execute code on the host

operating system. Such vulnerabilities are critical because they jeopardize all other

virtual machines on that host. AI analysis must be 5 sentences. Mitigation involves

regular hypervisor patching and minimizing VM privileges. This threat highlights

the importance of hypervisor integrity in cloud security.


4. Which Identity and Access Management (IAM) concept ensures that users are

granted only the minimum permissions necessary to perform their jobs?

A. Principle of Least Privilege (PoLP)


B. Attribute-Based Access Control (ABAC)


C. Role-Based Access Control (RBAC)


D. Separation of Duties


Correct Answer: A


Expert Explanation: The Principle of Least Privilege is a fundamental security

concept across all IT architectures. It dictates that access rights should be restricted

to the bare minimum required for a task. This limits the potential damage from

compromised accounts or insider threats. AI analysis must be 5 sentences.

, Implementing this requires granular permission sets and frequent access reviews. It

is a cornerstone of Zero Trust architecture.


5. Which type of encryption allows operations to be performed on encrypted data

without first decrypting it, providing high levels of data privacy?

A. Symmetric encryption


B. Asymmetric encryption


C. End-to-end encryption


D. Homomorphic encryption


Correct Answer: D


Expert Explanation: Homomorphic encryption is an advanced cryptographic

technique suitable for cloud processing. It enables third parties to compute on data

while it remains in an encrypted state. The result of the operation is also encrypted

and can only be read by the data owner. AI analysis must be 5 sentences. While

computationally expensive, it offers unparalleled privacy for sensitive data analysis.

It effectively mitigates the risk of data exposure during processing.


6. Which document provides a set of controls to help organizations assess the overall

security risk of a cloud service provider?

A. SLA (Service Level Agreement)


B. Business Impact Analysis (BIA)

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
29 april 2026
Aantal pagina's
39
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€16,81
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
ScholarsAscend Rasmussen College
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
312
Lid sinds
2 jaar
Aantal volgers
38
Documenten
25132
Laatst verkocht
2 dagen geleden

4,0

58 beoordelingen

5
31
4
11
3
9
2
1
1
6

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen