100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C845 INFORMATION SYSTEMS SECURITY QUESTIONS WITH COMPLETE ANSWERS

Rating
-
Sold
-
Pages
109
Grade
A+
Uploaded on
19-12-2025
Written in
2025/2026

WGU C845 INFORMATION SYSTEMS SECURITY QUESTIONS WITH COMPLETE ANSWERS

Institution
WGU C845
Course
WGU C845











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C845
Course
WGU C845

Document information

Uploaded on
December 19, 2025
Number of pages
109
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

IPsec transport mode


Give this one a try later!


can be used between two endpoints.




How can an equivalent to RBAC be implemented in a DAC operating system?


A Assign users classification labels.


B Create groups with the names of jobs, assign privileges to the groups, and place
users into named groups.


C Assign users job labels.


D Use filter lists to control access, set time restrictions, and block access based on
logical address.

,Give this one a try later!


B. To create an equivalent role-based access control (RBAC) solution in a
discretionary access control (DAC) operating system, an administrator
should create groups with the names of jobs, assign privileges to the
groups, and then place users into named groups. Thus, users will be
members of job role named groups and inherit the privileges assigned to
that group. This will result in users being able to perform their work tasks
assigned to them. This is the same result as in a true RBAC system where a
job label is created, privileges are assigned to the label, and then the label
is assigned to or placed onto a user.

Answer C is incorrect. Assigning job labels is just RBAC, not an equivalent
of RBAC in DAC. Furthermore, DAC does not offer job labels, only access
control via access control lists (ACLs) on objects.

Answer A is incorrect. Mandatory access control (MAC) uses the assigning
of classification labels. RBAC and DAC do not use classification labels.


Answer D is incorrect. Filter lists, time restrictions, and logical address
control are all valid means of access control, just not relevant to this
scenario.




What is the primary benefit of a security camera for physical security?
A Detective
B Corrective
C Directive
D Preventative


Give this one a try later!

, A. The primary benefit of a security camera for physical security is
detective. A security camera is a recording device and is a physical activity
auditing system. Anything that takes place in view of a camera can be
recorded. Thus, the camera serves as a detective security mechanism for
physical security. A security camera can also be considered a deterrent as
well.

Answer C is incorrect. A security camera does not provide directive
security control. A directive control gives instruction on how to act or
behave, such as a sign, policy, or verbal statement from a security guard.


Answer D is incorrect. A security camera does not provide preventative
security control. A preventative control attempts to stop a violation from
occurring, such as locks on doors, mantraps, and turnstiles.

Answer B is incorrect. A security camera does not provide corrective
security control. A corrective control attempts to restore a mechanism back
to its desired, normal, and secure state. Examples include a spring on a
door, a daylight sensor on a light, and a security guard who can lock a
door.




What must every policy possess in order to be successfully implemented?


A Senior executive endorsement
B Scope and statements from stakeholders
C An enforcement provision
D Controls and procedures statement


Give this one a try later!


A. The policy will be doomed to failure if it does not have senior executive
endorsement or a mandate from senior management.




Which was originally programmed for UNIX systems by Massachusetts Institute of
Technology (MIT)?

, A Single sign-on
B Kerberos
C Federated access
D Centralized authentication


Give this one a try later!


B




What is a security procedure?
A Specific criteria that must be met by implementation
B Suggested practices
C Detailed steps for performing specific tasks
D Minimum hardware and software requirements


Give this one a try later!

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
CLASSROOMTEST Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
33
Member since
10 months
Number of followers
0
Documents
6187
Last sold
3 weeks ago

3.4

7 reviews

5
3
4
1
3
1
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions