100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C845 Information Systems Security (SSCP) – Brian MacFarlane Study Set 2026 | Updated Quizlet Questions & Answers | CISSP Prep

Rating
-
Sold
-
Pages
624
Grade
A+
Uploaded on
13-01-2026
Written in
2025/2026

This document covers updated Quizlet-style questions and answers for WGU C845 Information Systems Security (SSCP), based on the Brian MacFarlane study set for 2026. It focuses on core SSCP and CISSP-aligned concepts, helping students prepare effectively for assessments and certification-style exams.

Show more Read less
Institution
WGU C845
Module
WGU C845











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C845
Module
WGU C845

Document information

Uploaded on
January 13, 2026
Number of pages
624
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU
(SSCP)C845 INFORMATION SYSTEMS SECURITY (SSCP) WGU C845 INFORMATION SYSTEMS SECURITY
1|Page




WGU C845 INFORMATION SYSTEMS SECURITY (SSCP)
QUIZLET 2026 | BRIAN MACFARLANE STUDY SET |
UPDATED QUESTIONS & ANSWERS | CISSP PREP |


Which of the following is a symmetric algorithm?


A Diffie-Hellman
B RSA
C AES
D HMAC ANS >>> C


How can a user be given the power to set privileges on an object for
other users when within a DAC operating system?


A Remove special permission for the user on the object.
B Grant the user full control over the object.
C Give the user the modify privilege on the object.
D Issue an administrative job label to the user. ANS >>> B

,WGU
(SSCP)C845 INFORMATION SYSTEMS SECURITY (SSCP) WGU C845 INFORMATION SYSTEMS SECURITY
2|Page


Your company adopts a new end-user security awareness program. This
training includes malware introduction, social media issues, password
guidelines, data exposure, and lost devices. How often should end users
receive this training?


A once a year and upon termination
B upon new hire and once a year thereafter
C upon termination
D twice a year
E upon new hire
F once a year ANS >>> B


What type of event is more likely to trigger the business continuity plan
(BCP) rather than the disaster recovery plan (DRP)?


A A port-scanning event against your public servers in the DMZ
B A security breach of an administrator account
C Several users failing to remember their logon credentials
D A level 5 hurricane ANS >>> B


What is the IEEE standard known as port-based network access control
which is used to leverage authentication already present in a network to
validate clients connecting over hardware devices, such as wireless
access points or VPN concentrators?

,WGU
(SSCP)C845 INFORMATION SYSTEMS SECURITY (SSCP) WGU C845 INFORMATION SYSTEMS SECURITY
3|Page


An IEEE 802.1x
B IEEE 802.15
C IEEE 802.3
D IEEE 802.11 ANS >>> A


Why is change control and management used as a component of
software asset management?


A To stop changes from being implemented into an environment
B To oversee the asset procurement process
C To prevent or reduce unintended reduction in security
D To restrict the privileges assigned to compartmentalized
administrators ANS >>> C


What is the cost benefit equation?


A [ALE1 - ALE2] - CCM
B AES - CCMP
C total initial risk - countermeasure benefit
D AV x EF x ARO ANS >>> A

, WGU
(SSCP)C845 INFORMATION SYSTEMS SECURITY (SSCP) WGU C845 INFORMATION SYSTEMS SECURITY
4|Page

What is the best means to restore the most current form of data when a
backup strategy is based on starting each week off with a full backup
followed by a daily differential?


A Restore the initial week's full backup and then the last differential
backup before the failure.


B Restore only the last differential backup.


C Restore the initial week's full backup and then each differential
backup up to the failure.


D Restore the last differential backup and then the week's full backup. --
-CORRECT- ANSWER ☑️☑️☑️ A


Which of the following is not considered an example of a non-
discretionary access control system?


A MAC
B ACL
C ABAC
D RBAC ANS >>> B


How should countermeasures be implemented as part of the recovery
phase of incident response?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Lectsadh havard university
View profile
Follow You need to be logged in order to follow users or courses
Sold
320
Member since
2 year
Number of followers
102
Documents
12286
Last sold
7 hours ago
lectsadh

NURSING SCHOOL IS HARD AM HERE TO SIMPLIFY THE INFORMATION AND MAKE IT EASIER!! My mission is to be your light in the dark, if you are worried or having trouble in nursing school, i really want my notes to be your guide, stay with me and you will find everything you need to study and pass any tests, quizzes and exams! Assisting students with quality work is my first priority. I know how frustrating it can get with all those assignments mate! I have essential guides that are A graded. Get verified solutions from LECTSADH.

Read more Read less
4.0

71 reviews

5
39
4
7
3
16
2
4
1
5

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions