Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU Course C845 - Information Systems Security (SSCP) Quizlet by Brian MacFarlane Questions and Answers 100% Correct

Rating
-
Sold
-
Pages
301
Grade
A+
Uploaded on
21-01-2026
Written in
2025/2026

WGU Course C845 - Information Systems Security (SSCP) Quizlet by Brian MacFarlane

Institution
WGU C845
Course
WGU C845

Content preview

WGU Course C845 - Information
Systems Security (SSCP) Quizlet by
Brian MacFarlane

Which of the following is a symmetric algorithm?

A Diffie-Hellman
B RSA
C AES
D HMAC - answerC

How can a user be given the power to set privileges on an object for other users when
within a DAC operating system?

A Remove special permissions for the user on the object.
B Grant the user full control over the object.
C Give the user the modify privilege on the object.
D Issue an administrative job label to the user. - answerB

Your company adopts a new end-user security awareness program. This training
includes malware introduction, social media issues, password guidelines, data
exposure, and lost devices. How often should end users receive this training?

A once a year and upon termination
B upon new hire and once a year thereafter
C upon termination
D twice a year
E upon new hire
F once a year - answerB

What type of event is more likely to trigger the business continuity plan (BCP) rather
than the disaster recovery plan (DRP)?

A A port-scanning event against your public servers in the DMZ
B A security breach of an administrator account
C Several users failing to remember their logon credentials
D A level 5 hurricane - answerB

What is the IEEE standard known as port-based network access control which is used
to leverage authentication already present in a network to validate clients connecting
over hardware devices, such as wireless access points or VPN concentrators?

,A IEEE 802.1x
B IEEE 802.15
C IEEE 802.3
D IEEE 802.11 - answerA

Why is change control and management used as a component of software asset
management?

A To stop changes from being implemented into an environment
B To oversee the asset procurement process
C To prevent or reduce unintended reduction in security
D To restrict the privileges assigned to compartmentalized administrators - answerC

What is the cost benefit equation?

A [ALE1 - ALE2] - CCM
B AES - CCMP
C total initial risk - countermeasure benefit
D AV x EF x ARO - answerA

What is the best means to restore the most current form of data when a backup strategy
is based on starting each week off with a full backup followed by a daily differential?

A Restore the initial week's full backup and then the last differential backup before the
failure.

B Restore only the last differential backup.

C Restore the initial week's full backup and then each differential backup up to the
failure.

D Restore the last differential backup and then the week's full backup. - answerA

Which of the following is not considered an example of a non-discretionary access
control system?

A MAC
B ACL
C ABAC
D RBAC - answerB

How should countermeasures be implemented as part of the recovery phase of incident
response?

A During next year's security review

,B Based on the lowest cost among available options
C As defined by the current security policy
D As determined by the violation that occurred - answerD

Remote control malware was found on a client device, and an unknown attacker was
manipulating the network from afar. The attack resulted in the network switches
reverting to flooding mode, thereby enabling the attacker to eavesdrop on a significant
portion of network communications. After reviewing IDS and traffic logs, you determine
that this was accomplished by an attack utility which generated a constant Ethernet
frames with random source MAC addresses. What can be done to prevent this attack
from occurring in the future?

A Restrict access to DHCP.
B Use a static HOSTS file.
C Use MAC limiting on the switch ports.
D Implement an ARP monitor. - answerC

How is quantitative risk analysis performed?

A Through the Delphi technique
B With scenario-based assessments
C Using calculations
D Via employee interviews - answerC

What special component on a motherboard can be used to securely store the
encryption key for whole drive encryption?

A CMOS
B RAM
C TPM
D CPU - answerC

When is it appropriate to contact law enforcement when an organization experiences a
security breach?

A If a violation is more severe than just breaking company policy rules
B If a breach of security occurs
C If a tolerable or accepted risk is realized
D If an insider uses another employee's credentials - answerA

What is the name of a cryptographic attack based on a database of pre-computed hash
values and the original plaintext values?

A Brute force attack
B Rainbow table attack
C Frequency analysis

, D Chosen plaintext attack - answerB

What is the purpose of a Security Information and Event Management (SIEM) product?

A To provide real-time logging and analysis of security events
B To define the requirements of security procedures
C To provide event planning guidance for holding industry conferences
D To improve employee security training - answerA

How does salting passwords reduce the likelihood that a password cracking attack will
be successful?

A It prevents automated attacks.
B It forces the attacker to focus on one account at a time.
C It triggers an account lockout after a fixed number of false attempts.
D It increases the work load required to become successful. - answerD

Which of the following clearance levels or classification labels is not generally used in a
government- or military-based MAC scheme?

A Unclassified
B Confidential
C Top Secret
D Proprietary - answerD

You are starting a new website. You want to quickly allow users to begin using your site
without having the hassle of creating a new user account. You set up a one-way trust
federated access link from your website to the three major social networks. Why should
you use a one-way trust in this configuration rather than a two-way trust in this
scenario?

A A one-way trust allows your website to trust the user accounts of the social networks
without requiring the social networks to trust your website.

B Two-way trusts are only valid in private networks and cannot be used across the
Internet.

C A one-way trust allows your website to access the file storage of the social networks.

D A two-way trust would grant the social network administrators full access to your
backend database. - answerA

Why should the risks of an organization be reported as defined by enterprise risk
management (ERM)?

A It is a means to predict loss, select countermeasures, and reduce downtime.

Written for

Institution
WGU C845
Course
WGU C845

Document information

Uploaded on
January 21, 2026
Number of pages
301
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$18.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Resolution Nursing
Follow You need to be logged in order to follow users or courses
Sold
308
Member since
3 year
Number of followers
188
Documents
16074
Last sold
2 weeks ago
NURSING VIEW

In my shop you will find documents, package deals, nursing courses, assigments,flashcards and all revision materials .You are welcome

4.0

61 reviews

5
38
4
4
3
6
2
4
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions