WGU C845 Latest Final Assessment Exam
Complete 1600 ISC2 SSCP Certification Exam
Practice Question 100% Original Exam
(ANSWERED) Graded A+ ALL YEAR EXAM
When you update records in multiple locations or you make a copy of the
whole database at a remote location as a way to achieve the proper level
of fault-tolerance and redundancy, it is knows as?
A. Shadowing
B. Data mirroring
C. Backup
D. Archiving
A
Recovery Site Strategies for the technology environment depend on how
much downtime an organization can tolerate before the recovery must be
completed. What would you call a strategy where the alternate site is
internal, standby ready, with all the technology and equipment necessary
to run the applications?
A. External Hot site
,C845 - Information Systems Security
B. Warm Site
C. Internal Hot Site
D. Dual Data Center
C
What is the most correct choice below when talking about the steps to
resume normal operation at the primary site after the green light has
been given by the salvage team?
A. The most critical operations are moved from alternate site to primary
site before others
B. Operation may be carried by a completely different team than disaster
recovery team
C. The least critical functions should be moved back first
D. You moves items back in the same order as the categories document in
your plan or exactly in the same order as you did on your way to the
alternate site
C
,C845 - Information Systems Security
What would be the Annualized Rate of Occurrence (ARO) of the threat
"user input error", in the case where a company employs 100 data entry
clerks and every one of them makes one input error each month?
A. 100
B. 120
C. 1
D. 1200
D
How is Annualized Loss Expectancy (ALE) derived from a threat?
A. ARO x (SLE - EF)
B. SLE x ARO
C. SLE/EF
D. AV x EF
B
What does "residual risk" mean?
, C845 - Information Systems Security
A. The security risk that remains after controls have been implemented
B. Weakness of an assets which can be exploited by a threat
C. Risk that remains after risk assessment has has been performed
D. A security risk intrinsic to an asset being audited, where no mitigation
has taken place.
A
Business Continuity and Disaster Recovery Planning (Primarily) addresses
the:
A. Availability of the CIA triad
B. Confidentiality of the CIA triad
C. Integrity of the CIA triad
D. Availability, Confidentiality and Integrity of the CIA triad
A
What is called an event or activity that has the potential to cause harm to
the information systems or networks?
A. Vulnerability
B. Threat agent