Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C845 - SSCP Study Guide PT2 Questions and Answers

Beoordeling
-
Verkocht
-
Pagina's
10
Cijfer
A+
Geüpload op
21-01-2026
Geschreven in
2025/2026

WGU C845 - SSCP Study Guide PT2

Instelling
WGU C845
Vak
WGU C845

Voorbeeld van de inhoud

WGU C845 - SSCP Study Guide PT2

Which item is not part of the primary security categories? - answer Encryption

What type of technical control can be used in the process of assessing compliance? -
answer Auditing

What is the result of an access control management process that adds new capabilities
to users as their job tasks change over time, but does not perform a regular
reassessment of the assigned authorization? - answer Privilege Creep

What are the three main components of a smart lock or an electronic access control
(EAC) lock? - answer Credential reader
locking mechanism
door closed sensor

Which technique best describes a one-to-one search to verify an individual's claim of
identity? - answerAuthentication

The sensitivity adjustment on a biometric authentication device affects which of the
following? - answerFalse acceptance rate & False rejection rate

What is the name of a physical security mechanism that is used to eliminate
piggybacking and tailgating and includes two locked doorways? - answerMantrap

Which of the following is a poor choice for secure password management? - answerUse
the default password.

How does discretionary access control determine whether a subject has valid
permission to access an object? - answerCheck for the user identity in the object's ACL.

Question 10 :What is the type of access control in the default access control method
found in Microsoft Windows which allows users to share files? - answerDiscretionary
access control

How can an organization protect itself from compromise by accounts that were used by
previous employees? - answerAccount deactivation

If information being protected is critical, which is the best course of action? - answerThe
encryption password should be changed more frequently

, Which trust architecture or model is based on the concept of an individual top level
entity that all other entities trust with entities organized in levels or layers below the top
level? - answerHierarchical trust

Which of the following types of access control is preferred for its ease of administration
when there are a large number of personnel with the same job in an organization? -
answerRole-based Access Control

How many accounts should a typical administrative user have and why? - answerTwo
accounts:
one for general tasks
one for special privilege tasks

How is granular control of objects and resources implemented within a mandatory
access control environment? - answerNeed to know

Properly managing user accounts is an essential element in maintaining security. How
should the process of identity management be implemented? - answerPolicies and
procedures - privileged accounts have significant access capability; define the
parameters of use with authorized use policies, nondisclosure agreements, and
confidentiality agreements to reduce risk.

How is account provisioning commonly accomplished? - answerCreate user groups
based on assigned company department or job responsibility.

Why is account or identity proofing necessary? - answerIt verifies that only the
authorized person is able to use a specific user account.

What is the term used to describe a relationship between two entities where resources
from either side can be accessed by users from either side? - answerTwo-way trust

Your company has recently acquired a small startup company, Metroil. Metroil has a
single Microsoft Active Directory domain named Metroil-HQ. Your company has three
existing domains: BaseStar1, RemoteOf2, and RemoteOf3. Your company's three
existing domains are configured in a standard domain tree, with BaseStar1 linked to
RemoteOf2, which is then linked to RemoteOf3. How can users from Metroil be able to
access resources in BaseStar1 with the least amount of network reconfiguration? -
answerEstablish a trust between RemoteOf3 and Metroil-HQ

Access control is best described as which of the following? - answerThe use of
identification and authorization techniques

Proper security administration policies, controls, and procedures enforce which of the
following? - answerThe AIC objectives
Availability, integrity, confidentiality

Geschreven voor

Instelling
WGU C845
Vak
WGU C845

Documentinformatie

Geüpload op
21 januari 2026
Aantal pagina's
10
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$18.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Resolution Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
308
Lid sinds
3 jaar
Aantal volgers
188
Documenten
16074
Laatst verkocht
1 week geleden
NURSING VIEW

In my shop you will find documents, package deals, nursing courses, assigments,flashcards and all revision materials .You are welcome

4.0

61 beoordelingen

5
38
4
4
3
6
2
4
1
9

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen