100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C845 INFORMATION SYSTEMS SECURITY VUN1 TASK 3: EVALUATING & DEFENDING DATA SECURITY AND SYSTEM OPERATIONS | COMPLETE A+ GUIDE

Rating
-
Sold
-
Pages
587
Grade
A+
Uploaded on
23-01-2026
Written in
2025/2026

WGU C845 INFORMATION SYSTEMS SECURITY VUN1 TASK 3: EVALUATING & DEFENDING DATA SECURITY AND SYSTEM OPERATIONS | COMPLETE A+ GUIDE

Institution
WGU C845
Course
WGU C845











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C845
Course
WGU C845

Document information

Uploaded on
January 23, 2026
Number of pages
587
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

1|Page




WGU C845 INFORMATION SYSTEMS SECURITY VUN1

TASK 3: EVALUATING & DEFENDING DATA

SECURITY AND SYSTEM OPERATIONS | COMPLETE

A+ GUIDE




A 'Pseudo flaw' is which of the following?



A. An apparent loophole deliberately implanted in an operating system program as a trap for

intruders.

B. An omission when generating Psuedo-code.

C. Used for testing for bounds violations in application programming.

D. A normally generated page fault causing the system to halt. - - ANS✔️--A



A backup site is best described by which of the following options?

,2|Page


A A computer facility with power and HVAC and all servers and communications. All

applications are ready to be installed and configured, and recent data is available to be restored to

the site.



B A computer facility with electrical power and HVAC but with no applications or installed data

on the workstations or servers prior to the event



C A computer facility with available electrical power and HVAC and some print/file servers. No

equipment has been installed at the site.



D An alternate computing location with little power and air-conditioning is but no

telecommunications capability - - ANS✔️--A



A BCP determined that the maximum amount of data that an organization can afford to lose from

an online database is most recent 60 Minutes of online transactions. Which of the following is a

valid Choice based on the BCP conclusion?



A the recovery time objective needs to be less than 1 hour

B the recovery time needs to be more than one hour

C the recovery Point objective needs to be less than 1 hour

D the recovery Point objective needs to be more than one hour - - ANS✔️--C



A business asset is best described by which of the following?

,3|Page




A Competitive advantage, capability, credibility, or goodwill

B Controls put in place that reduce the effects of threats

C An asset loss that could cause a financial or operational impact to the organization

D Personnel, compensation, and retirement programs - - ANS✔️--A



A business continuity plan is an example of which of the following?



A. Corrective control

B. Detective control

C. Preventive control

D. Compensating control - - ANS✔️--A



A Business Continuity Plan should be tested:



A. Once a month.

B. At least twice a year.

C. At least once a year.

D. At least once every two years. - - ANS✔️--C



A business continuity plan should list and prioritize the services that need to be brought back

after a disaster strikes. Which of the following services is more likely to be of primary concern in

the context of what your Disaster Recovery Plan would include?

, 4|Page




A. Marketing/Public relations

B. Data/Telecomm/IS facilities

C. IS Operations

D. Facilities security - - ANS✔️--B



A business is preparing to create an e-commerce website. It wants to make sure that the

business's website is trusted when an HTTP session is established. What should the business do?



A Use SSL in all sessions

B Ensure that the checkout process is encrypted

C Purchase a certificate from a public CA

D Publish a certificate from a private CA - - ANS✔️--C



A central authority determines what subjects can have access to certain objects based on the

organizational security policy is called:



A. Mandatory Access Control

B. Discretionary Access Control

C. Non-Discretionary Access Control

D. Rule-based Access control - - ANS✔️--C
$18.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
StudyWizard23
1.0
(1)

Get to know the seller

Seller avatar
StudyWizard23 Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
3
Member since
1 year
Number of followers
0
Documents
216
Last sold
2 weeks ago
StudyWizardLeviStuvia

StudyWizardLeviStuvia

1.0

1 reviews

5
0
4
0
3
0
2
0
1
1

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions