WGU C845 ISC2(TM) Systems Security
Certified Practitioner
Designed by MasterCard and Visa, this type of protocol offers protection to electronic
transactions? - answer SET
Which of the following is a hardware token that generates a random string of characters
to enter into a corresponding authentication application? - answer Key fob
Which is NOT a characteristic of the RSA algorithm? - answer Is based on symmetric
algorithm
Which logical topology usually has a physical star topology - answer
What type of malicious code disguises itself as a legitimate or serviceable program? -
answerTrojan Horse
What access control locks information used in mission critical systems and applications
based on sensitivity levels (Confidential, Top Secret, etc.)? - answerMAC - Mandatory
Access Control
What is the nickname given to the Trusted Computer Security Evaluation Criteria
(TCSEC) book, according to IT professionals? - answerThe orange book
PEM and PGP programs use which form of encryption, enabling users to send and
receive encrypted messages? - answerRSA
If your organization wants the most efficient restore from backup, which type of backup
would you choose? - answerFull
What is considered the most dangerous component of a virus program? -
answerPayload
Choose the password configuration rules enforced by the Passfilt.dll Windows add-on. -
answerPassword must have a combination of upper case, lower case, numbers, and
special characters; including a 6 character minimum password length
Encryption is attained at what layer of the OSI model? - answerPresentation Layer -
Layer 6
Which of the following are effective email controls? - answerSpam filtering, anti-virus,
monitor outbound traffic, and train employees on the secure use of personal email
Certified Practitioner
Designed by MasterCard and Visa, this type of protocol offers protection to electronic
transactions? - answer SET
Which of the following is a hardware token that generates a random string of characters
to enter into a corresponding authentication application? - answer Key fob
Which is NOT a characteristic of the RSA algorithm? - answer Is based on symmetric
algorithm
Which logical topology usually has a physical star topology - answer
What type of malicious code disguises itself as a legitimate or serviceable program? -
answerTrojan Horse
What access control locks information used in mission critical systems and applications
based on sensitivity levels (Confidential, Top Secret, etc.)? - answerMAC - Mandatory
Access Control
What is the nickname given to the Trusted Computer Security Evaluation Criteria
(TCSEC) book, according to IT professionals? - answerThe orange book
PEM and PGP programs use which form of encryption, enabling users to send and
receive encrypted messages? - answerRSA
If your organization wants the most efficient restore from backup, which type of backup
would you choose? - answerFull
What is considered the most dangerous component of a virus program? -
answerPayload
Choose the password configuration rules enforced by the Passfilt.dll Windows add-on. -
answerPassword must have a combination of upper case, lower case, numbers, and
special characters; including a 6 character minimum password length
Encryption is attained at what layer of the OSI model? - answerPresentation Layer -
Layer 6
Which of the following are effective email controls? - answerSpam filtering, anti-virus,
monitor outbound traffic, and train employees on the secure use of personal email