100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Cybersecurity Architecture and Engineering (D488) – WGU – Final Exam Test Bank (2025/2026)

Rating
-
Sold
-
Pages
28
Grade
A+
Uploaded on
24-08-2025
Written in
2025/2026

This document provides the complete test bank for the D488 Final Exam at Western Governors University (WGU). It covers key topics in cybersecurity architecture and engineering, including security frameworks, system design, network protection, risk management, and cryptographic principles. Updated for the 2025/2026 academic year, this resource is designed to help students prepare effectively and master critical cybersecurity concepts.

Show more Read less
Institution
Cybersecurity Architecture And Engineering
Course
Cybersecurity Architecture and Engineering










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cybersecurity Architecture and Engineering
Course
Cybersecurity Architecture and Engineering

Document information

Uploaded on
August 24, 2025
Number of pages
28
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • network protection review

Content preview

1




Cybersecurity Architecture and
Engineering (D488) – WGU – Final
Exam Test Bank (2025/2026)
Exam Overview
• Course: WGU D488 Cybersecurity Architecture and Engineering
• Exam Type: Objective Assessment (Final Exam)
• Topics Covered:
o Architecture Frameworks: Secure network design, cloud infrastructure, and
enterprise architecture (e.g., TOGAF, SABSA).
o Secure Protocols: TLS, IPsec, DNSSEC, and key exchange mechanisms.
o Encryption: Symmetric/asymmetric algorithms, block ciphers, and authenticated
encryption.
o Risk不适用
Risk Management: Strategies to mitigate vulnerabilities, threat surfaces, and
compliance (e.g., PCI DSS, GDPR).
o Cyber Defense: Firewalls, IDS/IPS, WAF, endpoint protection, and incident
response.
• Format: 150 questions, multiple-choice, scenario-based, testing practical application of
cybersecurity concepts.

Question Bank
Architecture Frameworks (30 Questions)

1. A company is designing a secure network to protect sensitive data. Which
architecture framework emphasizes aligning security with business goals?
A. NIST Cybersecurity Framework
B. SABSA
C. Zachman Framework
D. COBIT
Correct Answer: B. SABSA
Rationale: SABSA (Sherwood Applied Business Security Architecture) focuses on
aligning security with business objectives, ensuring security measures support
organizational goals, unlike NIST (risk management), Zachman (enterprise architecture),
or COBIT (IT governance).
2. What is the primary purpose of a demilitarized zone (DMZ) in network
architecture?
A. Encrypting internal network traffic
B. Providing a buffer zone for public-facing services

, 2


C. Blocking all external traffic
D. Managing user authentication
Correct Answer: B. Providing a buffer zone for public-facing services
Rationale: A DMZ isolates public-facing services (e.g., web servers) from the internal
network, reducing the risk of unauthorized access to sensitive systems.
3. A company implements a zero-trust architecture. What is a core principle of this
model?
A. Trust all internal network devices
B. Verify every access request regardless of location
C. Allow unrestricted access within the network
D. Use a single firewall for protection
Correct Answer: B. Verify every access request regardless of location
Rationale: Zero-trust architecture requires continuous verification of all access requests,
assuming no device or user is inherently trusted, per NIST SP 800-207.
4. Which component in a cloud VPC enables communication with the internet?
A. Network Address Translation (NAT)
B. Internet Gateway (IGW)
C. Virtual Private Network (VPN)
D. Web Application Firewall (WAF)
Correct Answer: B. Internet Gateway (IGW)
Rationale: An IGW is a VPC component that allows communication between the cloud
VPC and the internet, enabling public access to resources.
5. What is the role of a load balancer in network architecture?
A. Encrypts data in transit
B. Distributes traffic across multiple servers
C. Blocks malicious traffic
D. Authenticates user credentials
Correct Answer: B. Distributes traffic across multiple servers
Rationale: A load balancer distributes incoming network traffic across multiple servers
to ensure scalability, reliability, and performance.
6. A company uses a TOGAF framework for enterprise architecture. What is its
primary focus?
A. Cybersecurity risk assessment
B. Aligning IT with business strategy
C. Hardware security implementation
D. Real-time threat detection
Correct Answer: B. Aligning IT with business strategy
Rationale: TOGAF (The Open Group Architecture Framework) focuses on aligning IT
systems with business goals, providing a structured approach to enterprise architecture.
7. Which architecture design principle minimizes the attack surface?
A. Network segmentation
B. Full network access
C. Single-layer security
D. Unrestricted API access
Correct Answer: A. Network segmentation

, 3


Rationale: Network segmentation divides the network into smaller zones, limiting lateral
movement by attackers and reducing the attack surface.
8. What is a key benefit of micro-segmentation in a software-defined network?
A. Increases network latency
B. Enhances granular access control
C. Simplifies firewall rules
D. Reduces encryption needs
Correct Answer: B. Enhances granular access control
Rationale: Micro-segmentation applies fine-grained security policies to individual
workloads, improving access control and limiting attack spread.
9. A company implements a defense-in-depth strategy. What does this involve?
A. Relying on a single firewall
B. Using multiple layers of security controls
C. Disabling all external access
D. Encrypting only sensitive data
Correct Answer: B. Using multiple layers of security controls
Rationale: Defense-in-depth uses multiple security controls (e.g., firewalls, IDS,
encryption) to provide redundancy and mitigate risks if one layer fails.
10. Which cloud architecture model ensures complete isolation of resources?
A. Public cloud
B. Private cloud
C. Hybrid cloud
D. Community cloud
Correct Answer: B. Private cloud
Rationale: A private cloud provides dedicated resources for a single organization,
ensuring isolation and enhanced security compared to public or hybrid clouds.
11. What is the purpose of a security group in a cloud VPC?
A. Encrypts data at rest
B. Acts as a virtual firewall for instances
C. Manages user authentication
D. Balances network traffic
Correct Answer: B. Acts as a virtual firewall for instances
Rationale: Security groups in a VPC control inbound and outbound traffic to instances,
functioning as a virtual firewall for access control.
12. A company uses a hub-and-spoke network model. What is its primary advantage?
A. Simplifies encryption
B. Centralizes traffic management
C. Increases network latency
D. Eliminates firewalls
Correct Answer: B. Centralizes traffic management
Rationale: The hub-and-spoke model centralizes traffic through a hub, enabling
consistent security policies and monitoring across spokes.
13. Which framework helps assess an organization’s cybersecurity maturity?
A. CMMI
B. NIST Cybersecurity Framework
C. ITIL

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
STUVIASTUDYGUIDE University Of California - Los Angeles (UCLA)
View profile
Follow You need to be logged in order to follow users or courses
Sold
585
Member since
2 year
Number of followers
199
Documents
4012
Last sold
14 hours ago
STUVIASTUDYGUIDES

Join Thousands of successful students who use our study materials to boost their grades. With carefully crafted notes and well-researched guides, you're just a click away from mastering your courses. Study hard, study smart, and get the grades you deserve!

3.5

74 reviews

5
32
4
11
3
10
2
7
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions