Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C845 SSCP EXAM COMPLETE QUESTIONS AND VERIFIED ANSWERS

Beoordeling
-
Verkocht
-
Pagina's
49
Cijfer
A+
Geüpload op
05-02-2026
Geschreven in
2025/2026

WGU C845 SSCP EXAM COMPLETE QUESTIONS AND VERIFIED ANSWERS Q.During what phase of the change management process does the organization conduct peer review of the change for accuracy and completeness? - ANSWERS-Analysis/Impact Assessment Q.Steve is responsible for work stations that handle proprietary information. What is the best option for these workstations at the end of their lifecycle? - ANSWERS-Sanitization Q.What is the earliest stage of a fire to use detection technology to identify it? - ANSWERS-Incipient Q.What security control would provide the best defense against a threat actor trying to execute a buffer overflow attack against a custom application? - ANSWERS-Parameter Checking/Input Validation Q.Which of the following is NOT true of the ISC2 Code of Ethics? A. Adherence to the Code of Ethics is a condition of Certification B. The code of ethics applies to all security professionals C. Failure to comply with the Code of Ethics could result in revocation of certification D. Members who observe a breach of the Code of Ethics are required to report the possible violation - ANSWERS-B. Q.Under what type of software license does the recipient of software have an unlimited right to copy, modify, distribute, or resell a software package? - ANSWERS-Public Domain Q.What should Steve do if a FAR/FRR diagram does not provide an acceptable performance level for his organization's needs? - ANSWERS-Assess other biometric systems to compare them since the CER is used to assess biometric devices. Q.What is the CER in biometric device measurment? - ANSWERS-Crossover Error Rate is the number that results when a biometric device is adjusted to provide equal false acceptance and false rejection rates. Q.What type of access control would be the best choice for a person that would like to support a declaration like "Only allow access to customer service on managed devices on the wireless network between 8 am and 7 pm"? - ANSWERS-Attribute Based Access Control ABAC Q.What is the benefit of an ABAC over a RBAC? - ANSWERS-An ABAC can be more specific thus more flexible Q.What is the primary advantage of decentralized access control? - ANSWERS-It provides control of access to people closer to the resources Q.How are rules set in ABAC systems? - ANSWERS-Uses boolean logic statements which allow it to be more flexible than RBAC for temporary rules such as to allow time limited access. Q.Which of the following is best described as an access control model that focuses on subjects and identifies the objects that each subject can access? A. Access control list B. Capability Table C. Implicit denial list D. Rights Management Matrix - ANSWERS-B Q.Adam is accessing a standalone file server using a username and password provided by the server administrator. Which one of the following entities is guaranteed to have information necessary to complete the authorization process? A. File Server B. Adam C. Server Administrator D. Adam's Supervisor - ANSWERS-A. The file server has the correct information on what activities Adam is AUTHORIZED to perform Q.A new member at a 24 hour gym that uses fingerprints to gain access after hours is surprised to find out that he is registering as a different member. What type of biometric factor error occurred? - ANSWERS-Since he was accepted as a different member this was a Type 2 (false positive) error. If he was not accepted and the door remained locked it would have been a Type 1 (false negative) error. Q.You are tasked with adjusting your organizations password requirements to make them align with best practices from NIST. What should you set password expiration to? - ANSWERS-NIST Special Publication 800-63b suggests that organizations should not impose password expiration requirements on end users Q.What access control scheme labels subjects and objects and allows subjects to access objects when labels match? - ANSWERS-Mandatory Access Control (MAC) Q.Mandatory Access Control is based on what type of model? - ANSWERS-Lattice Based Q.You need to create a trust relationship between your company and a vendor. You need to implement the system so that it will allow users from the vendor's organization to access your accounts payable system using the accounts created for them by the vendor. What type of authentication do you need to implement? - ANSWERS-This type of authentication, where one domain trusts users from another domain, is called federation. Q.Users change job positions quite often at your new company. Which type of access control would make it easier to allow administrators to adjust permissions when these changes occur? A. Role-Based Access Control B. Mandatory Access Control C. Discretionary Access Control D. Rule-Based Access Control - ANSWERS-A Role-Based Access Control would assign permission to roles and then the administrator would simply adjust the role of the user when he or she changes jobs Q.Which of the following authenticators is appropriate to use by itself rather than in combination with other biometric factors? A. Voice pattern recognition B. Hand geometry C. Palm scans D. Heart/pulse patterns - ANSWERS-C. Palm scans compare the vein patterns in the palm to a database to authenticate a user. Q.As part of hiring a new employee, Sven's identity management team creates a new user object and ensures that the user object is available in the directories and systems where it is needed. What is this process called? - ANSWERS-Provisioning includes the creation, maintenance, and removal of user objects from applications, systems, and directories. Q.The Linux filesystem allows the owners of objects to determine the access rights that subjects have to them. What type of access control does Linux use? - ANSWERS-Discretionary Access Control Q.Mary's organization handles very sensitive governmental agency information. They need to implement an access control system that allows administrators to set access rights but does not allow the delegation of those rights to other users. What is the best type of access control design for Mary's organization? - ANSWERS-Mandatory Access Control (MAC) systems allow an administrator to configure access permissions but do not allow users to delegate permission to others. Q.What term is used to describe the default set of privileges assigned to a user when a new account is created? A. Aggregation B. Transitivity C. Baseline D. Entitlement - ANSWERS-D. Entitlement refers to the privileges granted to useres when an account is first provisioned. Q.Steve is the risk manager for a company on the east coast of the United States. He recently undertook a replacement cost analysis and determined that rebuilding and reconfiguring the data center would cost $20 million. Steve consulted with hurricane experts, data center specialists, and structural engineers and they determined that a typical CAT 3 hurricane that successfully hits the east coast would cause approximately $5 million in damages. The meteorologists determined that Steve's facility lies in an area where they are likely to experience a CAT 3 hurricane once every 10 years. Based upon the information in this scenario, what is the exposure factor for the effect of a CAT 3 hurricane on Steve's data center? - ANSWERS-The exposure factor is the percentage of the facility that risk managers expect will be damaged if a risk materializes. It is calculated by dividing the amount of damage by the asset value. In this case, that is $5 million in damage divided by the $20 million facility value, or 25 percent. Q.Steve is the risk manager for a company on the east coast of the United States. He recently undertook a replacement cost analysis and determined that rebuilding and reconfiguring the data center would cost $20 million. Steve consulted with hurricane experts, data center

Meer zien Lees minder
Instelling
WGU C845 SSCP
Vak
WGU C845 SSCP

Voorbeeld van de inhoud

WGU C845 SSCP EXAM COMPLETE
QUESTIONS AND VERIFIED ANSWERS



\Q\.During what phase of the change management process does the organization conduct peer
review of the change for accuracy and completeness? - ANSWERS✔-Analysis/Impact
Assessment



\Q\.Steve is responsible for work stations that handle proprietary information. What is the best
option for these workstations at the end of their lifecycle? - ANSWERS✔-Sanitization



\Q\.What is the earliest stage of a fire to use detection technology to identify it? - ANSWERS✔-
Incipient



\Q\.What security control would provide the best defense against a threat actor trying to
execute a buffer overflow attack against a custom application? - ANSWERS✔-Parameter
Checking/Input Validation



\Q\.Which of the following is NOT true of the ISC2 Code of Ethics?

A. Adherence to the Code of Ethics is a condition of Certification

B. The code of ethics applies to all security professionals

C. Failure to comply with the Code of Ethics could result in revocation of certification

D. Members who observe a breach of the Code of Ethics are required to report the possible
violation - ANSWERS✔-B.

,\Q\.Under what type of software license does the recipient of software have an unlimited right
to copy, modify, distribute, or resell a software package? - ANSWERS✔-Public Domain



\Q\.What should Steve do if a FAR/FRR diagram does not provide an acceptable performance
level for his organization's needs? - ANSWERS✔-Assess other biometric systems to compare
them since the CER is used to assess biometric devices.



\Q\.What is the CER in biometric device measurment? - ANSWERS✔-Crossover Error Rate is the
number that results when a biometric device is adjusted to provide equal false acceptance and
false rejection rates.



\Q\.What type of access control would be the best choice for a person that would like to
support a declaration like "Only allow access to customer service on managed devices on the
wireless network between 8 am and 7 pm"? - ANSWERS✔-Attribute Based Access Control ABAC



\Q\.What is the benefit of an ABAC over a RBAC? - ANSWERS✔-An ABAC can be more specific
thus more flexible



\Q\.What is the primary advantage of decentralized access control? - ANSWERS✔-It provides
control of access to people closer to the resources



\Q\.How are rules set in ABAC systems? - ANSWERS✔-Uses boolean logic statements which
allow it to be more flexible than RBAC for temporary rules such as to allow time limited access.



\Q\.Which of the following is best described as an access control model that focuses on subjects
and identifies the objects that each subject can access?

A. Access control list

B. Capability Table

C. Implicit denial list

,D. Rights Management Matrix - ANSWERS✔-B



\Q\.Adam is accessing a standalone file server using a username and password provided by the
server administrator. Which one of the following entities is guaranteed to have information
necessary to complete the authorization process?

A. File Server

B. Adam

C. Server Administrator

D. Adam's Supervisor - ANSWERS✔-A. The file server has the correct information on what
activities Adam is AUTHORIZED to perform



\Q\.A new member at a 24 hour gym that uses fingerprints to gain access after hours is
surprised to find out that he is registering as a different member. What type of biometric factor
error occurred? - ANSWERS✔-Since he was accepted as a different member this was a Type 2
(false positive) error. If he was not accepted and the door remained locked it would have been a
Type 1 (false negative) error.



\Q\.You are tasked with adjusting your organizations password requirements to make them align
with best practices from NIST. What should you set password expiration to? - ANSWERS✔-NIST
Special Publication 800-63b suggests that organizations should not impose password expiration
requirements on end users



\Q\.What access control scheme labels subjects and objects and allows subjects to access
objects when labels match? - ANSWERS✔-Mandatory Access Control (MAC)



\Q\.Mandatory Access Control is based on what type of model? - ANSWERS✔-Lattice Based



\Q\.You need to create a trust relationship between your company and a vendor. You need to
implement the system so that it will allow users from the vendor's organization to access your
accounts payable system using the accounts created for them by the vendor. What type of

, authentication do you need to implement? - ANSWERS✔-This type of authentication, where
one domain trusts users from another domain, is called federation.



\Q\.Users change job positions quite often at your new company. Which type of access control
would make it easier to allow administrators to adjust permissions when these changes occur?

A. Role-Based Access Control

B. Mandatory Access Control

C. Discretionary Access Control

D. Rule-Based Access Control - ANSWERS✔-A Role-Based Access Control would assign
permission to roles and then the administrator would simply adjust the role of the user when he
or she changes jobs



\Q\.Which of the following authenticators is appropriate to use by itself rather than in
combination with other biometric factors?

A. Voice pattern recognition

B. Hand geometry

C. Palm scans

D. Heart/pulse patterns - ANSWERS✔-C. Palm scans compare the vein patterns in the palm to a
database to authenticate a user.



\Q\.As part of hiring a new employee, Sven's identity management team creates a new user
object and ensures that the user object is available in the directories and systems where it is
needed. What is this process called? - ANSWERS✔-Provisioning includes the creation,
maintenance, and removal of user objects from applications, systems, and directories.



\Q\.The Linux filesystem allows the owners of objects to determine the access rights that
subjects have to them. What type of access control does Linux use? - ANSWERS✔-Discretionary
Access Control

Geschreven voor

Instelling
WGU C845 SSCP
Vak
WGU C845 SSCP

Documentinformatie

Geüpload op
5 februari 2026
Aantal pagina's
49
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$13.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
IszackBd University Of Washington
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
34
Lid sinds
1 jaar
Aantal volgers
2
Documenten
5016
Laatst verkocht
1 dag geleden
IszackBd Stuvia

Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers. We specialize on NURSING,WGU,ACLS USMLE,TNCC,PMHNP,ATI and other major courses, Updated Exam, Study Guides and Test banks. If you don't find any document you are looking for in this store contact us and we will fetch it for you in minutes, we love impressing our clients with our quality work and we are very punctual on deadlines. Please go through the sets description appropriately before any purchase and leave a review after purchasing so as to make sure our customers are 100% satisfied. FOR ANY REQUEST FEEL FREE TO REACH US

Lees meer Lees minder
5.0

3 beoordelingen

5
3
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen