Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C845 - SSCP Study Guide PT1. Questions and Answers 100% Solved

Beoordeling
-
Verkocht
-
Pagina's
11
Cijfer
A+
Geüpload op
21-01-2026
Geschreven in
2025/2026

WGU C845 - SSCP Study Guide PT1.

Instelling
WGU C845
Vak
WGU C845

Voorbeeld van de inhoud

WGU C845 - SSCP Study Guide PT1

John works in an organization. He is trying to insert a password to log in his account on
the organization's login website. Which of the following best describes the use of
passwords for access control? - answer Authentication

What is the primary benefit of a security camera for physical security? - answer
Detective

Why is it important to perform a physical security assessment after a fire, chemical
release, or bomb false alarm? - answer The event could have been triggered as a
distraction to alter physical security mechanisms.

What type of access control is typically the first line of defense? - answer Physical

What is the condition of an IDS security assessment reporting that an event of concern
has taken place, but when later analyzed it is determined that the event was benign and
should not have caused an IDS alert? - answerFalse Positive

Your organization experienced an impersonation attack recently that compromised the
network administrator's user account. In response, new security measures are being
implemented throughout the organization. You have been assigned the task of
improving authentication. You want a new authentication system that ensures the
following:

Eavesdropped passwords cannot be used by an attacker.
Passwords are only able to be used once.
Password predication must be prevented.
Passwords are only valid for a short period of time.

How can you accomplish these goals? - answerImplement a synchronized, one-time
password token-based authentication system.

Which of the following is an example of a single-factor authentication being used to gain
access to a computer system? - answerUsing a username and a 16-character password

How can a user be given the power to set privileges on an object for other users when
within a DAC operating system? - answerGrant the user full control over the object.

Which of the following are the examples of a non-discretionary access control system?

Each correct answer represents a complete solution. Choose all that apply. -
answerMAC (Mandatory Access Control)

, RBAC (Role Based Access Control)
ABAC (Attribute-Based Access Control)

Which of the following clearance levels or classification labels is not generally used in a
government- or military-based MAC scheme? - answerProprietary

How are the access control schemes of MAC and RBAC distinguished from DAC? -
answerThe are not based on user decisions.

How is role-based access control implemented? - answerBy assigning a job name label
to subjects

How can account provisioning be configured so that the assignment of rights and
privileges is nearly automatic once the account is created? - answerUse an RBAC
mechanism where a new user's role is set by an HR admin.

How can account provisioning be configured so that the assignment of rights and
privileges is nearly automatic once the account is created? - answerHave the user type
in the username and password a second time

What is user entitlement? - answerThe rights and privileges assigned to a user

Your organization is using Kerberos for private network authentication. How does
Kerberos demonstrate to a resource host that the identity of a user is valid? - answerAn
ST is issued to the user, which is then sent to the resource host.

What is the technology that enables a user to authenticate to a company network from
their assigned workstation and then be able to interact with resources throughout the
private network without needing to enter additional credentials? - answerSingle Sign-On

You are starting a new website. You want to quickly allow users to begin using your site
without having the hassle of creating a new user account. You set up a one-way trust
federated access link from your website to the three major social networks. Why should
you use a one-way trust in this configuration rather than a two-way trust in this
scenario? - answerA one-way trust allows your website to trust the user accounts of the
social networks without requiring the social networks to trust your website.

Your company is partnering with Verigon to produce a new suite of services for the
financial industry. To create and support these new services, both organizations will
need to share content and perform collaborative work. The new services are to be
offered only to pre-selected and invited clients, rather than being sold openly. How can
this new service be configured without significantly increasing the risk to either
company's private networks? - answerSet up the new service in an extranet and provide
VPN credentials to Verigon and invited clients.

Geschreven voor

Instelling
WGU C845
Vak
WGU C845

Documentinformatie

Geüpload op
21 januari 2026
Aantal pagina's
11
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$19.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Resolution Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
308
Lid sinds
3 jaar
Aantal volgers
188
Documenten
16074
Laatst verkocht
1 week geleden
NURSING VIEW

In my shop you will find documents, package deals, nursing courses, assigments,flashcards and all revision materials .You are welcome

4.0

61 beoordelingen

5
38
4
4
3
6
2
4
1
9

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen