100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU C795 CYBERSECURITY MANAGEMENT FINAL STANDARD SET WITH CORRECT SOLUTIONS EXAM 2026

Puntuación
-
Vendido
-
Páginas
17
Grado
A+
Subido en
17-01-2026
Escrito en
2025/2026

WGU C795 CYBERSECURITY MANAGEMENT FINAL STANDARD SET WITH CORRECT SOLUTIONS EXAM 2026 __________ provide the detailed steps needed to carry out ___________. Procedures, policies A __________ grants the authority to perform an action on a system. A __________ grants access to a resource. right, permission A business continuity plan (BCP) is an example of a(n): security plan A hacker wants to launch an attack on an organization. The hacker uses a tool to capture data sent over the network in cleartext, hoping to gather information that will help make the attack successful. What tool is the hacker using? a packet analyzer A threat is any activity that represents a possible danger, which includes any circumstances or events with the potential to cause an adverse impact on all of the following, except: assessments A(n) ____________ assessment attempts to identify vulnerabilities that can be exploited. A. risk B. threat C. vulnerability D. exploit D. exploit An access control such as a firewall or intrusion prevention system cannot protect against which of the following? Social engineering Another term for data range and reasonableness checks is: input validation Background checks, software testing, and awareness training are all categories of: procedural controls. WGU C795 WGU C795 Bill is a security professional. He is in a meeting with co-workers and describes a system that will make web sessions more secure. He says when a user connects to the web server and starts a secure session, the server sends a certificate to the user. The certificate includes a public key. The user can encrypt data with the public key and send it to the server. Because the server holds the private key, it can decrypt the data. Because no other entity has the private key, no one else can decrypt the data. What is Bill describing? A. Public key infrastructure (PKI) B. Certificate authority (CA) C. A hashing algorithm D. A digital signature A. Public key infrastructure (PKI) Bonding is a type of __________ that covers against losses by theft, fraud, or dishonesty. Insurance Complete the equation for the relationship between risk, vulnerabilities, and threats: Risk equals: Vulnerability × Threat . Functionality testing is primarily used with: Software Development Ideally, when should you perform threat modeling? A. After writing an application or deploying a system B. Before writing an application, but after deploying a system C. After writing an application, but before deploying a system D. Before writing an application or deploying a system D. Before writing an application or deploying a system In a SQL injection attack, an attacker can: read sections of a database or a whole database without authorization. Piggybacking is also known as: A. tailgating. B. a mantrap. C. social engineering. D. shoulder surfing. A. tailgating. Primary considerations for assessing threats based on historical data in your local area are __________ and ___________. WGU C795 WGU C795 A. property value, insurance B. weather conditions, natural disasters C. historical data, threat modeling D. crime statistics, flood frequency B. weather conditions, natural disasters Purchasing insurance is the primary way for an organization to __________ or ___________ risk. A. transfer, accept B. mitigate, accept C. share, transfer D. accept, share C. share, transfer Some controls are identified based on the function they perform. What are the broad classes of controls based on function? Preventative, detective, corrective System logs and audit trails are a type of ________ control. A. physical B. corrective C. technical D. procedural C. technical The actual methods used to protect against data loss are __________ controls, but the program that identifies which data to protect is a ___________ control. technical, procedural The National Institute of Standards and Technology (NIST) publishes SP 800-53. This document describes a variety of IT security controls, such as access control, incident response, and configuration management. Controls are grouped into families. Which NIST control family helps an organization recover from failures and disasters? Contingency Planning(CP) To _________ risk means to reduce or neutralize threats or vulnerabilities to an acceptable level. Mitigate What changes plaintext data to ciphered data? encryption What characteristic is common to risk assessments and threat assessments? They are both performed for a specific time. What does the principle of least privilege have in common with the principle of need to know? WGU C795 WGU C795 They both specify that users be granted access only to what they need to perform their jobs. What is a transaction in a database? A group of statements that either succeed or fail as a whole What is the purpose of nonrepudiation techniques To prevent people from denying they took actions When performing threat assessments, it's important to ensure you understand the system or application you are evaluating. To understand a given system or app

Mostrar más Leer menos
Institución
WGU C795 Cybersecurity Management
Grado
WGU C795 Cybersecurity Management










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU C795 Cybersecurity Management
Grado
WGU C795 Cybersecurity Management

Información del documento

Subido en
17 de enero de 2026
Número de páginas
17
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU C795




WGU C795 CYBERSECURITY MANAGEMENT
FINAL STANDARD SET WITH CORRECT
SOLUTIONS EXAM 2026

__________ provide the detailed steps needed to carry out ___________.
Procedures, policies
A __________ grants the authority to perform an action on a system. A __________
grants access to a resource.
right, permission
A business continuity plan (BCP) is an example of a(n):
security plan
A hacker wants to launch an attack on an organization. The hacker uses a tool to
capture data sent over the network in cleartext, hoping to gather information that will
help make the attack successful. What tool is the hacker using?
a packet analyzer
A threat is any activity that represents a possible danger, which includes any
circumstances or events with the potential to cause an adverse impact on all of the
following, except:
assessments
A(n) ____________ assessment attempts to identify vulnerabilities that can be
exploited.

A. risk
B. threat
C. vulnerability
D. exploit
D. exploit
An access control such as a firewall or intrusion prevention system cannot protect
against which of the following?
Social engineering
Another term for data range and reasonableness checks is:
input validation
Background checks, software testing, and awareness training are all categories of:
procedural controls.


WGU C795

,WGU C795


Bill is a security professional. He is in a meeting with co-workers and describes a
system that will make web sessions more secure. He says when a user connects to the
web server and starts a secure session, the server sends a certificate to the user. The
certificate includes a public key. The user can encrypt data with the public key and send
it to the server. Because the server holds the private key, it can decrypt the data.
Because no other entity has the private key, no one else can decrypt the data. What is
Bill describing?

A. Public key infrastructure (PKI)
B. Certificate authority (CA)
C. A hashing algorithm
D. A digital signature
A. Public key infrastructure (PKI)
Bonding is a type of __________ that covers against losses by theft, fraud, or
dishonesty.
Insurance
Complete the equation for the relationship between risk, vulnerabilities, and threats:
Risk equals:
Vulnerability × Threat .
Functionality testing is primarily used with:
Software Development
Ideally, when should you perform threat modeling?

A. After writing an application or deploying a system
B. Before writing an application, but after deploying a system
C. After writing an application, but before deploying a system
D. Before writing an application or deploying a system
D. Before writing an application or deploying a system
In a SQL injection attack, an attacker can:
read sections of a database or a whole database without authorization.
Piggybacking is also known as:

A. tailgating.
B. a mantrap.
C. social engineering.
D. shoulder surfing.
A. tailgating.
Primary considerations for assessing threats based on historical data in your local area
are __________ and ___________.



WGU C795

, WGU C795


A. property value, insurance
B. weather conditions, natural disasters
C. historical data, threat modeling
D. crime statistics, flood frequency
B. weather conditions, natural disasters
Purchasing insurance is the primary way for an organization to __________ or
___________ risk.

A. transfer, accept
B. mitigate, accept
C. share, transfer
D. accept, share
C. share, transfer
Some controls are identified based on the function they perform. What are the broad
classes of controls based on function?
Preventative, detective, corrective
System logs and audit trails are a type of ________ control.

A. physical
B. corrective
C. technical
D. procedural
C. technical
The actual methods used to protect against data loss are __________ controls, but the
program that identifies which data to protect is a ___________ control.
technical, procedural
The National Institute of Standards and Technology (NIST) publishes SP 800-53. This
document describes a variety of IT security controls, such as access control, incident
response, and configuration management. Controls are grouped into families. Which
NIST control family helps an organization recover from failures and disasters?
Contingency Planning(CP)
To _________ risk means to reduce or neutralize threats or vulnerabilities to an
acceptable level.
Mitigate
What changes plaintext data to ciphered data?
encryption
What characteristic is common to risk assessments and threat assessments?
They are both performed for a specific time.
What does the principle of least privilege have in common with the principle of need to
know?


WGU C795
$25.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
AlexScorer
4.0
(1)

Conoce al vendedor

Seller avatar
AlexScorer Chamberlain College Of Nursing
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
5
Miembro desde
1 año
Número de seguidores
0
Documentos
1566
Última venta
3 meses hace
Best Scorers Review Guide

Hesitate not to get 100% Recent updated and Verified Documents .Total Guarantee to success

4.0

1 reseñas

5
0
4
1
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes