Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C845 SSCP EXAM STUDY GUIDE INFORMATION SYSTEM SECURITY WITH COMPLETE SOLUTIONS

Beoordeling
-
Verkocht
-
Pagina's
10
Cijfer
A+
Geüpload op
24-12-2025
Geschreven in
2025/2026

WGU C845 SSCP EXAM STUDY GUIDE INFORMATION SYSTEM SECURITY This guide covers essential SSCP topics organized into logical sections. Each section includes core concepts, best practices, and comparisons where needed. I. Security Fundamentals & Access Control 1. Configuration Management & Access Control Models ● Configuration Management Practice ○ Purpose: Maintain system integrity via version control, audits, and baseline settings. ○ Key Focus: Change management processes and accurate configuration documentation. ● Access Control Models ○ Decentralized (Discretionary Access Control – DAC): Local decisions at the resource level; users manage their own permissions. ○ Mandatory Access Control (MAC): Centralized, strict policies defined by the organization. ○ Role-Based Access Control (RBAC): Access based on a user’s role within the organization. ○ Additional Methods: ■ Capability Tables: Map subjects (users/processes) to permitted operations on objects. ■ Access Control Lists (ACLs): Collections of Access Control Entries (ACEs) that specify allowed or denied permissions. ● Device Authentication & Administrative Shares ○ Device Authentication: Uses certificates, tokens, or cryptographic keys to verify a device’s identity. ○ Administrative Shares: Hidden network shares (e.g., C$, ADMIN$) used for remote management (note: these pose security risks if not managed properly). 2. Account Management ● Steps in Account Management: ○ Provisioning: Create accounts with appropriate roles and permissions. ○ Modification: Update accounts as roles or job functions change. ○ Deactivation/Deletion: Disable or remove accounts that are no longer needed. ○ Periodic Review: Regularly audit account permissions and activity. ○ Password/Authentication Management: Enforce strong credentials and consider using shadow password systems (storing hashed passwords in secure files like /etc/shadow on UNIX/Linux). II. Network Security 1. VPNs and WiFi Security ● VPN Protocols: ○ ESP (Encapsulating Security Payload): Provides encryption (with optional authentication). ○ AH (Authentication Header): Provides authentication and integrity without encryption. ○ MBSA: A Microsoft tool that scans for security misconfigurations and missing updates. ● WiFi Security: ○ WEP: Insecure due to weak encryption and predictable initialization vectors. ○ WPA (with TKIP): Improved over WEP but has known vulnerabilities. ○ WPA2/WPA3: Use AES encryption and robust key management (with WPA3 offering enhanced security). 2. Firewalls, NAT, and Network Protocols ● Types of Firewalls: ○ Traditional Architectures: ■ Single-tier: One firewall (e.g., typical home router). ■ Two-tier: Perimeter firewall with a Demilitarized Zone (DMZ). ■ Three-tier: Adds an internal firewall for extra protection. ○ Other Types: ■ Packet Filtering Firewalls ■ Stateful Inspection Firewalls ■ Proxy-Based Firewalls ■ Next-Generation Firewalls (NGFW) ● Network Address Translation (SNAT): ○ SNAT (Source NAT): Translates private IP addresses to a public IP address for outbound traffic. ● Additional Network Technologies: ○ MPLS (Multi-Protocol Label Switching): Improves routing efficiency and traffic management. ○ FCoE (Fibre Channel over Ethernet): Converges storage and data networks, carrying Fibre Channel traffic over Ethernet.

Meer zien Lees minder
Instelling
WGU C845 SSCP INFORMATION SYSTEM
Vak
WGU C845 SSCP INFORMATION SYSTEM

Voorbeeld van de inhoud

lOMoAR cPSD| 60399657




WGU C845 SSCP EXAM STUDY GUIDE
INFORMATION SYSTEM SECURITY
This guide covers essential SSCP topics organized into logical sections. Each section includes core
concepts, best practices, and comparisons where needed.




I. Security Fundamentals & Access Control
1. Configuration Management & Access Control Models
● Configuration Management Practice
○ Purpose: Maintain system integrity via version control, audits, and baseline settings.
○ Key Focus: Change management processes and accurate configuration documentation.
● Access Control Models
○ Decentralized (Discretionary Access Control – DAC): Local decisions at the resource
level; users manage their own permissions.
○ Mandatory Access Control (MAC): Centralized, strict policies defined by the
organization.
○ Role-Based Access Control (RBAC): Access based on a user’s role within the
organization.
○ Additional Methods:
■ Capability Tables: Map subjects (users/processes) to permitted operations on
objects.
■ Access Control Lists (ACLs): Collections of Access Control Entries (ACEs)
that specify allowed or denied permissions. ● Device Authentication & Administrative Shares
○ Device Authentication: Uses certificates, tokens, or cryptographic keys to verify a device’s
identity.
○ Administrative Shares: Hidden network shares (e.g., C$, ADMIN$) used for remote
management (note: these pose security risks if not managed properly).

2. Account Management
● Steps in Account Management:
○ Provisioning: Create accounts with appropriate roles and permissions.
○ Modification: Update accounts as roles or job functions change.
○ Deactivation/Deletion: Disable or remove accounts that are no longer needed. ○
Periodic Review: Regularly audit account permissions and activity.

, lOMoAR cPSD| 60399657




○ Password/Authentication Management: Enforce strong credentials and consider using
shadow password systems (storing hashed passwords in secure files like /etc/shadow
on UNIX/Linux).




II. Network Security
1. VPNs and WiFi Security
● VPN Protocols:
○ ESP (Encapsulating Security Payload): Provides encryption (with optional
authentication).
○ AH (Authentication Header): Provides authentication and integrity without encryption.
○ MBSA: A Microsoft tool that scans for security misconfigurations and missing updates.
● WiFi Security:
○ WEP: Insecure due to weak encryption and predictable initialization vectors.
○ WPA (with TKIP): Improved over WEP but has known vulnerabilities.
○ WPA2/WPA3: Use AES encryption and robust key management (with WPA3 offering
enhanced security).

2. Firewalls, NAT, and Network Protocols
● Types of Firewalls:
○ Traditional Architectures:
■ Single-tier: One firewall (e.g., typical home router).
■ Two-tier: Perimeter firewall with a Demilitarized Zone (DMZ).
■ Three-tier: Adds an internal firewall for extra protection.
○ Other Types:
■ Packet Filtering Firewalls
■ Stateful Inspection Firewalls
■ Proxy-Based Firewalls
■ Next-Generation Firewalls (NGFW) ●
Network Address Translation (SNAT):
○ SNAT (Source NAT): Translates private IP addresses to a public IP address for outbound
traffic.
● Additional Network Technologies:
○ MPLS (Multi-Protocol Label Switching): Improves routing efficiency and traffic
management.
○ FCoE (Fibre Channel over Ethernet): Converges storage and data networks, carrying
Fibre Channel traffic over Ethernet.

Geschreven voor

Instelling
WGU C845 SSCP INFORMATION SYSTEM
Vak
WGU C845 SSCP INFORMATION SYSTEM

Documentinformatie

Geüpload op
24 december 2025
Aantal pagina's
10
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

  • wgu c845 sscp exam
$11.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Thumbnail
Voordeelbundel
WGU C845 SSCP EXAMS BUNDLE
-
12 2026
$ 163.88 Meer info

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
IszackBd University Of Washington
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
22
Lid sinds
1 jaar
Aantal volgers
2
Documenten
4180
Laatst verkocht
6 uur geleden
IszackBd Stuvia

Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers. We specialize on NURSING,WGU,ACLS USMLE,TNCC,PMHNP,ATI and other major courses, Updated Exam, Study Guides and Test banks. If you don't find any document you are looking for in this store contact us and we will fetch it for you in minutes, we love impressing our clients with our quality work and we are very punctual on deadlines. Please go through the sets description appropriately before any purchase and leave a review after purchasing so as to make sure our customers are 100% satisfied. FOR ANY REQUEST FEEL FREE TO REACH US

Lees meer Lees minder
3.0

2 beoordelingen

5
1
4
0
3
0
2
0
1
1

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen