100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C795 CYBERSECURITY MANAGEMENT FINAL STANDARD SET WITH CORRECT SOLUTIONS EXAM 2026

Rating
-
Sold
-
Pages
17
Grade
A+
Uploaded on
17-01-2026
Written in
2025/2026

WGU C795 CYBERSECURITY MANAGEMENT FINAL STANDARD SET WITH CORRECT SOLUTIONS EXAM 2026 __________ provide the detailed steps needed to carry out ___________. Procedures, policies A __________ grants the authority to perform an action on a system. A __________ grants access to a resource. right, permission A business continuity plan (BCP) is an example of a(n): security plan A hacker wants to launch an attack on an organization. The hacker uses a tool to capture data sent over the network in cleartext, hoping to gather information that will help make the attack successful. What tool is the hacker using? a packet analyzer A threat is any activity that represents a possible danger, which includes any circumstances or events with the potential to cause an adverse impact on all of the following, except: assessments A(n) ____________ assessment attempts to identify vulnerabilities that can be exploited. A. risk B. threat C. vulnerability D. exploit D. exploit An access control such as a firewall or intrusion prevention system cannot protect against which of the following? Social engineering Another term for data range and reasonableness checks is: input validation Background checks, software testing, and awareness training are all categories of: procedural controls. WGU C795 WGU C795 Bill is a security professional. He is in a meeting with co-workers and describes a system that will make web sessions more secure. He says when a user connects to the web server and starts a secure session, the server sends a certificate to the user. The certificate includes a public key. The user can encrypt data with the public key and send it to the server. Because the server holds the private key, it can decrypt the data. Because no other entity has the private key, no one else can decrypt the data. What is Bill describing? A. Public key infrastructure (PKI) B. Certificate authority (CA) C. A hashing algorithm D. A digital signature A. Public key infrastructure (PKI) Bonding is a type of __________ that covers against losses by theft, fraud, or dishonesty. Insurance Complete the equation for the relationship between risk, vulnerabilities, and threats: Risk equals: Vulnerability × Threat . Functionality testing is primarily used with: Software Development Ideally, when should you perform threat modeling? A. After writing an application or deploying a system B. Before writing an application, but after deploying a system C. After writing an application, but before deploying a system D. Before writing an application or deploying a system D. Before writing an application or deploying a system In a SQL injection attack, an attacker can: read sections of a database or a whole database without authorization. Piggybacking is also known as: A. tailgating. B. a mantrap. C. social engineering. D. shoulder surfing. A. tailgating. Primary considerations for assessing threats based on historical data in your local area are __________ and ___________. WGU C795 WGU C795 A. property value, insurance B. weather conditions, natural disasters C. historical data, threat modeling D. crime statistics, flood frequency B. weather conditions, natural disasters Purchasing insurance is the primary way for an organization to __________ or ___________ risk. A. transfer, accept B. mitigate, accept C. share, transfer D. accept, share C. share, transfer Some controls are identified based on the function they perform. What are the broad classes of controls based on function? Preventative, detective, corrective System logs and audit trails are a type of ________ control. A. physical B. corrective C. technical D. procedural C. technical The actual methods used to protect against data loss are __________ controls, but the program that identifies which data to protect is a ___________ control. technical, procedural The National Institute of Standards and Technology (NIST) publishes SP 800-53. This document describes a variety of IT security controls, such as access control, incident response, and configuration management. Controls are grouped into families. Which NIST control family helps an organization recover from failures and disasters? Contingency Planning(CP) To _________ risk means to reduce or neutralize threats or vulnerabilities to an acceptable level. Mitigate What changes plaintext data to ciphered data? encryption What characteristic is common to risk assessments and threat assessments? They are both performed for a specific time. What does the principle of least privilege have in common with the principle of need to know? WGU C795 WGU C795 They both specify that users be granted access only to what they need to perform their jobs. What is a transaction in a database? A group of statements that either succeed or fail as a whole What is the purpose of nonrepudiation techniques To prevent people from denying they took actions When performing threat assessments, it's important to ensure you understand the system or application you are evaluating. To understand a given system or app

Show more Read less
Institution
WGU C795 Cybersecurity Management
Course
WGU C795 Cybersecurity Management










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C795 Cybersecurity Management
Course
WGU C795 Cybersecurity Management

Document information

Uploaded on
January 17, 2026
Number of pages
17
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C795




WGU C795 CYBERSECURITY MANAGEMENT
FINAL STANDARD SET WITH CORRECT
SOLUTIONS EXAM 2026

__________ provide the detailed steps needed to carry out ___________.
Procedures, policies
A __________ grants the authority to perform an action on a system. A __________
grants access to a resource.
right, permission
A business continuity plan (BCP) is an example of a(n):
security plan
A hacker wants to launch an attack on an organization. The hacker uses a tool to
capture data sent over the network in cleartext, hoping to gather information that will
help make the attack successful. What tool is the hacker using?
a packet analyzer
A threat is any activity that represents a possible danger, which includes any
circumstances or events with the potential to cause an adverse impact on all of the
following, except:
assessments
A(n) ____________ assessment attempts to identify vulnerabilities that can be
exploited.

A. risk
B. threat
C. vulnerability
D. exploit
D. exploit
An access control such as a firewall or intrusion prevention system cannot protect
against which of the following?
Social engineering
Another term for data range and reasonableness checks is:
input validation
Background checks, software testing, and awareness training are all categories of:
procedural controls.


WGU C795

,WGU C795


Bill is a security professional. He is in a meeting with co-workers and describes a
system that will make web sessions more secure. He says when a user connects to the
web server and starts a secure session, the server sends a certificate to the user. The
certificate includes a public key. The user can encrypt data with the public key and send
it to the server. Because the server holds the private key, it can decrypt the data.
Because no other entity has the private key, no one else can decrypt the data. What is
Bill describing?

A. Public key infrastructure (PKI)
B. Certificate authority (CA)
C. A hashing algorithm
D. A digital signature
A. Public key infrastructure (PKI)
Bonding is a type of __________ that covers against losses by theft, fraud, or
dishonesty.
Insurance
Complete the equation for the relationship between risk, vulnerabilities, and threats:
Risk equals:
Vulnerability × Threat .
Functionality testing is primarily used with:
Software Development
Ideally, when should you perform threat modeling?

A. After writing an application or deploying a system
B. Before writing an application, but after deploying a system
C. After writing an application, but before deploying a system
D. Before writing an application or deploying a system
D. Before writing an application or deploying a system
In a SQL injection attack, an attacker can:
read sections of a database or a whole database without authorization.
Piggybacking is also known as:

A. tailgating.
B. a mantrap.
C. social engineering.
D. shoulder surfing.
A. tailgating.
Primary considerations for assessing threats based on historical data in your local area
are __________ and ___________.



WGU C795

, WGU C795


A. property value, insurance
B. weather conditions, natural disasters
C. historical data, threat modeling
D. crime statistics, flood frequency
B. weather conditions, natural disasters
Purchasing insurance is the primary way for an organization to __________ or
___________ risk.

A. transfer, accept
B. mitigate, accept
C. share, transfer
D. accept, share
C. share, transfer
Some controls are identified based on the function they perform. What are the broad
classes of controls based on function?
Preventative, detective, corrective
System logs and audit trails are a type of ________ control.

A. physical
B. corrective
C. technical
D. procedural
C. technical
The actual methods used to protect against data loss are __________ controls, but the
program that identifies which data to protect is a ___________ control.
technical, procedural
The National Institute of Standards and Technology (NIST) publishes SP 800-53. This
document describes a variety of IT security controls, such as access control, incident
response, and configuration management. Controls are grouped into families. Which
NIST control family helps an organization recover from failures and disasters?
Contingency Planning(CP)
To _________ risk means to reduce or neutralize threats or vulnerabilities to an
acceptable level.
Mitigate
What changes plaintext data to ciphered data?
encryption
What characteristic is common to risk assessments and threat assessments?
They are both performed for a specific time.
What does the principle of least privilege have in common with the principle of need to
know?


WGU C795
$25.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
AlexScorer
4.0
(1)

Get to know the seller

Seller avatar
AlexScorer Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
5
Member since
1 year
Number of followers
0
Documents
1566
Last sold
3 months ago
Best Scorers Review Guide

Hesitate not to get 100% Recent updated and Verified Documents .Total Guarantee to success

4.0

1 reviews

5
0
4
1
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions