100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C845 SSCP Comprehensive Resource To Help You Ace Includes Frequently Tested Questions With ELABORATED 100% Correct COMPLETE SOLUTIONS Guaranteed Pass First Attempt!! Current Update!!

Rating
-
Sold
-
Pages
154
Grade
A+
Uploaded on
12-01-2026
Written in
2025/2026

WGU C845 SSCP Comprehensive Resource To Help You Ace Includes Frequently Tested Questions With ELABORATED 100% Correct COMPLETE SOLUTIONS Guaranteed Pass First Attempt!! Current Update!! 1. Which of the following statements pertaining to using Kerberos without any extension is false? A. A client can be impersonated by password-guessing. B. Kerberos is mostly a third-party authentication protocol. C. Kerberos uses public key cryptography. D. Kerberos provides robust authentication - ANSWER C. Kerberos uses public key cryptography 2. Which of the following statements pertaining to Kerberos is false? A. The Key Distribution Center represents a single point of failure. B. Kerberos manages access permissions. C. Kerberos uses a database to keep a copy of all users' public keys. D. Kerberos uses symmetric key cryptography - ANSWER C. Kerberos uses a database to keep a copy of all users' public keys. 3. Which access control model would a lattice-based access control model be an example of? A. Mandatory access control. B. Discretionary access control. C. Non-discretionary access control. D. Rule-based access control - ANSWER A. Mandatory access control 4. Which of the following is an example of discretionary access control? A. Identity-based access control B. Task-based access control C. Role-based access control D. Rule-based access control - ANSWER A. Identity-based access control 5. Which of the following would be used to implement Mandatory Access Control (MAC)? A. Clark-Wilson Access Control B. Role-based access control C. Lattice-based access control D. User dictated access control - ANSWER C. Lattice-based access control

Show more Read less
Institution
WGU C845
Course
WGU C845











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C845
Course
WGU C845

Document information

Uploaded on
January 12, 2026
Number of pages
154
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • wgu c845

Content preview

WGU C845 SSCP Comprehensive Resource To
Help You Ace 2026-2027 Includes Frequently
Tested Questions With ELABORATED 100%
Correct COMPLETE SOLUTIONS

Guaranteed Pass First Attempt!!

Current Update!!



1. Which of the following statements pertaining to using Kerberos without any
extension is false?
A. A client can be impersonated by password-guessing.
B. Kerberos is mostly a third-party authentication protocol.
C. Kerberos uses public key cryptography.

D. Kerberos provides robust authentication - ANSWER C. Kerberos uses public
key cryptography


2. Which of the following statements pertaining to Kerberos is false?
A. The Key Distribution Center represents a single point of failure.
B. Kerberos manages access permissions.
C. Kerberos uses a database to keep a copy of all users' public keys.

D. Kerberos uses symmetric key cryptography - ANSWER C. Kerberos uses a
database to keep a copy of all users' public keys.

,3. Which access control model would a lattice-based access control model be an
example of?
A. Mandatory access control.
B. Discretionary access control.
C. Non-discretionary access control.

D. Rule-based access control - ANSWER A. Mandatory access control


4. Which of the following is an example of discretionary access control?
A. Identity-based access control
B. Task-based access control
C. Role-based access control

D. Rule-based access control - ANSWER A. Identity-based access control


5. Which of the following would be used to implement Mandatory Access Control
(MAC)?
A. Clark-Wilson Access Control
B. Role-based access control
C. Lattice-based access control

D. User dictated access control - ANSWER C. Lattice-based access control


6. Which type of attack involves impersonating a user or a system?
A. Smurfing attack
B. Spoofing attack
C. Spamming attack

,D. Sniffing attack - ANSWER B. Spoofing attack


7. Which of the following is NOT an advantage that TACACS+ has over TACACS?
A. Event logging
B. Use of two-factor password authentication
C. User has the ability to change his password

D. Ability for security tokens to be resynchronized - ANSWER A. Event logging


8. Which of the following remote access authentication systems is the most
robust?
A. TACACS+
B. RADIUS
C. PAP

D. TACACS - ANSWER A. TACAS+


9. Which of the following is an example of a passive attack?
A. Denying services to legitimate users
B. Shoulder surfing
C. Brute-force password cracking

D. Smurfing - ANSWER B. Shoulder surfing


10. What does the Clark-Wilson security model focus on?
A. Confidentiality

, B. Integrity
C. Accountability

D. Availability - ANSWER B. Integrity


11. What does the simple security (ss) property mean in the Bell-LaPadula model?
A. No read up
B. No write down
C. No read down

D. No write up - ANSWER A. No read up


12. What does the (star) property mean in the Bell-LaPadula model?
A. No write up
B. No read up
C. No write down

D. No read down - ANSWER C. No write down


13. What does the (star) integrity axiom mean in the Biba model?
A. No read up
B. No write down
C. No read down

D. No write up - ANSWER D. No write up


14. What does the simple integrity axiom mean in the Biba model?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EWLindy Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
710
Member since
3 year
Number of followers
431
Documents
7425
Last sold
2 days ago
EN.CY.CLO.PE.DI.A

As a Career Tutor, I understand the pressure of managing demanding coursework, exams, and practical requirements across multiple disciplines. These professionally organized revision materials are designed to support students in nursing, healthcare administration, business, information systems, Engineering, health, IT, or trade courses management programs by simplifying complex concepts and reinforcing high-yield academic content. The materials are developed to help students: Understand core theories and practical applications across Multiple Disciplines Review exam relevant content aligned with undergraduate and graduate curriculam To Strengthen critical thinking, analytical reasoning, and decision-making skills Save time with clear, structured summaries instead of overwhelming textbooks Prepare efficiently for tests, assignments, case studies, and professional exams Each resource is created with academic standards in mind, integrating real world examples, industry terminology, and evidence based concepts commonly required in professional programs. Whether you are studying nursing fundamentals, healthcare management, information systems, project management, business strategy, Engineering these materials provide focused, reliable support for academic success. These revision guides are ideal for: Nursing and allied health students Healthcare administration and public health students Business, MBA, and management students Information technology and information systems students, engineering, business, IT, or trade courses If you are looking for clear, student-friendly, exam-focused revision materials that support multiple career pathways, these resources are designed to help you study smarter, perform better, and stay confident throughout your academic journey. WISH YOU SUCCESS!!

Read more Read less
3.8

107 reviews

5
55
4
13
3
16
2
6
1
17

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions