Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

ISC2 SSCP WGU C845. Questions and Answers

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
21-01-2026
Written in
2025/2026

Exam of 9 pages for the course WGU C845 at WGU C845 (ISC2 SSCP WGU C845.)

Institution
WGU C845
Course
WGU C845

Content preview

ISC2 SSCP WGU C845

What is the set of protocols and standards that provide automated ways to create,
manage, and use trust relationships between servers and clients? - answer trust
framework

What are the design concepts and ideas by which organizations identify their needs for
technical and administrative implementation of trust frameworks as part of their broader
organizational information security posture? - answer trust architecture

What type of trust relationship are the design concepts and ideas by which
organizations identify their needs for technical and administrative implementation of
trust frameworks as part of their broader organizational information security posture? -
answer one-way trust

What type of trust relationship exist when both organizations have the same level of
trust in all of the users in the other's domain. This does not have to be as high a level of
trust as what they repose in their own people but just a symmetric or matching degree
of trust. - answertwo-way trust

What type of trust relationship happens when organization A trust organization B,
organization B trusts C, and then in effect organization A trusts C? - answertransitive

The term for being one at the root or start of that set of relationships in a chain of trust. -
answertrust anchor

What is a virtual extension to an organization's intranet (internal LAN) system, which
allows outside organizations to have a greater degree of collaboration, information
sharing, and use of information and systems of both organizations? They typically look
to provide application-layer shared access and may do this as part of a service-oriented
architecture (SOA) approach. - answerextranet

What is an internet segment logically restricted to users who are members of the
organization (that is, insiders)? - answerintranet

Third-party trust relationships usually involve what three parties? - answercontent user,
content owner, certifying authority that can attest that the content in question being sent
by the content owner to the content user is authentic

What is the triple-a of identity management? - answerauthentication, authorization, and
accounting

, What is the process of implementing the management decisions about a subject's
identity and the privileges associated with it into the logical, physical, and administrative
aspects of the access control functions throughout all of the systems this identity will
require (and be allowed) access to and use of? - answerprovisioning

What is the process of temporarily or permanently revoking both the privileges
associated with an identity and the identity itself? - answerdeprovisioning

What is the identity blocks it from further access but changes no other data pertaining to
that identity, no matter where it might be stored in your systems? - answerrevoking

What denies individual users (subjects) the capability to determine the security
characteristics of files, applications, folders, or other objects within their IT workspaces.
Users cannot make arbitrary decisions, for example, to share a folder tree if that sharing
privilege has not been previously granted to them. This implements the mandatory
security policies as defined previously and results in highly secure systems? -
answermandatory access control (MAC)

What allows individual users to determine the security characteristics of objects, such
as files, folders, or even entire systems, within their IT workspaces. This is perhaps the
most common access control implementation methodology, as it comes built in to nearly
every modern operating system available for servers and endpoint devices. Typically,
these systems provide users with the ability to grant or deny the privileges to read, write
(or create), modify, read and execute, list contents of a folder, share, extend, view other
metadata associated with the object, and modify other such metadata? -
answerdiscretionary access control (DAC)

What allows the organization to choose when and how to make access control
decisions based upon a wide range of specific needs. By using role-based access
control, for example, it can (in effect) levy mandatory access control policies on one set
of subjects, under one set of roles and conditions, but allow those same subjects to
enjoy more of a discretionary access control under other conditions. Various strategies,
based on role, subject, object, or attribute, can provide the required degree of flexibility
and control? - answernondiscretionary access control (NDAC)

What grants specific privileges to subjects regarding specific objects or classes of
objects based on the duties or tasks a person (or process) is required to fulfill. Several
key factors should influence the ways that role-based privileges are assigned? -
answerrole-based access control (RBAC)

What systems combine multiple characteristics (or attributes) about a subject, an object,
or the environment to authorize or restrict access? - answerattribute-based access
control (ABAC)

What uses characteristics of each object or each class of objects to determine what
types of access requests will be granted? - answerobject-based access control

Written for

Institution
WGU C845
Course
WGU C845

Document information

Uploaded on
January 21, 2026
Number of pages
9
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$18.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Resolution Nursing
Follow You need to be logged in order to follow users or courses
Sold
308
Member since
3 year
Number of followers
188
Documents
16074
Last sold
2 weeks ago
NURSING VIEW

In my shop you will find documents, package deals, nursing courses, assigments,flashcards and all revision materials .You are welcome

4.0

61 reviews

5
38
4
4
3
6
2
4
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions