Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

C845 Practice Questions 4.- 100% Correct

Rating
-
Sold
-
Pages
11
Grade
A+
Uploaded on
21-01-2026
Written in
2025/2026

C845 Practice Questions 4.

Institution
WGU C845
Course
WGU C845

Content preview

C845 Practice Questions 4

Username - answer Which one of the following tools is most often used for identification
purposes and is not suitable for use as an authenticator?

Password
Retinal scan
Username
Token

Separation of duties - answer Theresa is implementing a new access control system
and wants to ensure that developers do not have the ability to move code from
development systems into the production environment.
What information security principle is she most directly enforcing?

Separation of duties
Two-person control
Least privilege
Job rotation

Implement a SIEM. - answerNIST Special Publication 800-92, the Guide to Computer
Security Log Management, describes four types of common challenges to log
management:

Many log sources
Inconsistent log content
Inconsistent timestamps
Inconsistent log formats

Which of the following solutions is best suited to solving these issues?

Implement SNMP for all logging devices.
Implement a SIEM.
Standardize on the Windows event log format for all devices and use NTP.
Ensure that logging is enabled on all endpoints using their native logging formats and
set their local time correctly.

Secondary response procedures for first responders - answerWhich one of the following
components should be included in an organization's emergency response guidelines?

Secondary response procedures for first responders
Long-term business continuity protocols
Activation procedures for the organization's cold sites

, Contact information for ordering equipment

Repudiation - answerGary is analyzing a security incident and, during his investigation,
encounters a user who denies having performed an action that Gary believes he did
perform.
What type of threat has taken place under the STRIDE model?

Repudiation
Information disclosure
Tampering
Elevation of privilege

Retire or replace the device. - answerAfter scanning all the systems on his wireless
network, Mike notices that one system is identified as an iOS device running a
massively out-of-date version of Apple's mobile operating system.
When he investigates further, he discovers that the device is an original iPad and that it
cannot be updated to a current secure version of the operating system.
What should Mike recommend?

Retire or replace the device.
Isolate the device on a dedicated wireless network.
Install a firewall on the tablet.
Reinstall the OS.

PaaS - answerRick is an application developer who works primarily in Python.
He recently decided to evaluate a new service where he provides his Python code to a
vendor who then executes it on their server environment.
What type of cloud computing environment is this service?

SaaS
PaaS
IaaS
CaaS

A rainbow table attack - answerDuring a penetration test, Chris recovers a file
containing hashed passwords for the system he is attempting to access.
What type of attack is most likely to succeed against the hashed passwords?

A brute-force attack
A pass-the-hash attack
A rainbow table attack
A salt recovery attack

Blacklist - answerKay is selecting an application management approach for her
organization.

Written for

Institution
WGU C845
Course
WGU C845

Document information

Uploaded on
January 21, 2026
Number of pages
11
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$17.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Resolution Nursing
Follow You need to be logged in order to follow users or courses
Sold
308
Member since
3 year
Number of followers
188
Documents
16076
Last sold
5 days ago
NURSING VIEW

In my shop you will find documents, package deals, nursing courses, assigments,flashcards and all revision materials .You are welcome

4.0

61 reviews

5
38
4
4
3
6
2
4
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions