100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C845 SSCP Exam, Latest Premium Expert Update() Brand New Exam Questions With 100% Correct Answers, Already Graded A+, Guaranteed Success.

Rating
-
Sold
-
Pages
36
Grade
A+
Uploaded on
22-01-2025
Written in
2024/2025

WGU C845 SSCP Exam, Latest Premium Expert Update() Brand New Exam Questions With 100% Correct Answers, Already Graded A+, Guaranteed Success. During what phase of the change management process does the organization conduct peer review of the change for accuracy and completeness? - ANSWER-Analysis/Impact Assessment Steve is responsible for work stations that handle proprietary information. What is the best option for these workstations at the end of their lifecycle? - ANSWER-Sanitization What is the earliest stage of a fire to use detection technology to identify it? - ANSWER-Incipient What security control would provide the best defense against a threat actor trying to execute a buffer overflow attack against a custom application? - ANSWER-Parameter Checking/Input Validation Which of the following is NOT true of the ISC2 Code of Ethics? A. Adherence to the Code of Ethics is a condition of Certification B. The code of ethics applies to all security professionals C. Failure to comply with the Code of Ethics could result in revocation of certification D. Members who observe a breach of the Code of Ethics are required to report the possible violation - ANSWER-B. Under what type of software license does the recipient of software have an unlimited right to copy, modify, distribute, or resell a software package? - ANSWER-Public Domain What should Steve do if a FAR/FRR diagram does not provide an acceptable performance level for his organization's needs? - ANSWER-Assess other biometric systems to compare them since the CER is used to assess biometric devices. What is the CER in biometric device measurment? - ANSWER-Crossover Error Rate is the number that results when a biometric device is adjusted to provide equal false acceptance and false rejection rates. What type of access control would be the best choice for a person that would like to support a declaration like "Only allow access to customer service on managed devices on the wireless network between 8 am and 7 pm"? - ANSWER-Attribute Based Access Control ABAC What is the benefit of an ABAC over a RBAC? - ANSWER-An ABAC can be more specific thus more flexible What is the primary advantage of decentralized access control? - ANSWER-It provides control of access to people closer to the resources How are rules set in ABAC systems? - ANSWER-Uses boolean logic statements which allow it to be more flexible than RBAC for temporary rules such as to allow time limited access. Which of the following is best described as an access control model that focuses on subjects and identifies the objects that each subject can access? A. Access control list B. Capability Table C. Implicit denial list D. Rights Management Matrix - ANSWER-B Adam is accessing a standalone file server using a username and password provided by the server administrator. Which one of the following entities is guaranteed to have information necessary to complete the authorization process? A. File Server B. Adam C. Server Administrator

Show more Read less
Institution
WGU C845 SSCP
Course
WGU C845 SSCP











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C845 SSCP
Course
WGU C845 SSCP

Document information

Uploaded on
January 22, 2025
Number of pages
36
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

WGU C845 SSCP Exam, Latest
Premium Expert Update(2025-2026)
Brand New Exam Questions With
100% Correct Answers, Already
Graded A+, Guaranteed Success.




During what phase of the change management process does the organization
conduct peer review of the change for accuracy and completeness? - ANSWER-
✅✅Analysis/Impact Assessment

Steve is responsible for work stations that handle proprietary information. What is
the best option for these workstations at the end of their lifecycle? - ANSWER-
✅✅Sanitization

What is the earliest stage of a fire to use detection technology to identify it? -
ANSWER-✅✅Incipient

What security control would provide the best defense against a threat actor trying
to execute a buffer overflow attack against a custom application? - ANSWER-
✅✅Parameter Checking/Input Validation

Which of the following is NOT true of the ISC2 Code of Ethics?

,A. Adherence to the Code of Ethics is a condition of Certification
B. The code of ethics applies to all security professionals
C. Failure to comply with the Code of Ethics could result in revocation of certification
D. Members who observe a breach of the Code of Ethics are required to report the
possible violation - ANSWER-✅✅B.

Under what type of software license does the recipient of software have an
unlimited right to copy, modify, distribute, or resell a software package? - ANSWER-
✅✅Public Domain

What should Steve do if a FAR/FRR diagram does not provide an acceptable
performance level for his organization's needs? - ANSWER-✅✅Assess other
biometric systems to compare them since the CER is used to assess biometric
devices.

What is the CER in biometric device measurment? - ANSWER-✅✅Crossover Error
Rate is the number that results when a biometric device is adjusted to provide equal
false acceptance and false rejection rates.

What type of access control would be the best choice for a person that would like to
support a declaration like "Only allow access to customer service on managed
devices on the wireless network between 8 am and 7 pm"? - ANSWER-✅✅Attribute
Based Access Control ABAC

What is the benefit of an ABAC over a RBAC? - ANSWER-✅✅An ABAC can be more
specific thus more flexible

What is the primary advantage of decentralized access control? - ANSWER-✅✅It
provides control of access to people closer to the resources

How are rules set in ABAC systems? - ANSWER-✅✅Uses boolean logic statements
which allow it to be more flexible than RBAC for temporary rules such as to allow
time limited access.

Which of the following is best described as an access control model that focuses on
subjects and identifies the objects that each subject can access?
A. Access control list
B. Capability Table
C. Implicit denial list
D. Rights Management Matrix - ANSWER-✅✅B

Adam is accessing a standalone file server using a username and password provided
by the server administrator. Which one of the following entities is guaranteed to
have information necessary to complete the authorization process?
A. File Server
B. Adam
C. Server Administrator

,D. Adam's Supervisor - ANSWER-✅✅A. The file server has the correct information
on what activities Adam is AUTHORIZED to perform

A new member at a 24 hour gym that uses fingerprints to gain access after hours is
surprised to find out that he is registering as a different member. What type of
biometric factor error occurred? - ANSWER-✅✅Since he was accepted as a different
member this was a Type 2 (false positive) error. If he was not accepted and the door
remained locked it would have been a Type 1 (false negative) error.

You are tasked with adjusting your organizations password requirements to make
them align with best practices from NIST. What should you set password expiration
to? - ANSWER-✅✅NIST Special Publication 800-63b suggests that organizations
should not impose password expiration requirements on end users

What access control scheme labels subjects and objects and allows subjects to
access objects when labels match? - ANSWER-✅✅Mandatory Access Control (MAC)

Mandatory Access Control is based on what type of model? - ANSWER-✅✅Lattice
Based

You need to create a trust relationship between your company and a vendor. You
need to implement the system so that it will allow users from the vendor's
organization to access your accounts payable system using the accounts created for
them by the vendor. What type of authentication do you need to implement? -
ANSWER-✅✅This type of authentication, where one domain trusts users from
another domain, is called federation.

Users change job positions quite often at your new company. Which type of access
control would make it easier to allow administrators to adjust permissions when
these changes occur?
A. Role-Based Access Control
B. Mandatory Access Control
C. Discretionary Access Control
D. Rule-Based Access Control - ANSWER-✅✅A Role-Based Access Control would
assign permission to roles and then the administrator would simply adjust the role of
the user when he or she changes jobs

Which of the following authenticators is appropriate to use by itself rather than in
combination with other biometric factors?
A. Voice pattern recognition
B. Hand geometry
C. Palm scans
D. Heart/pulse patterns - ANSWER-✅✅C. Palm scans compare the vein patterns in
the palm to a database to authenticate a user.

As part of hiring a new employee, Sven's identity management team creates a new
user object and ensures that the user object is available in the directories and

, systems where it is needed. What is this process called? - ANSWER-✅✅Provisioning
includes the creation, maintenance, and removal of user objects from applications,
systems, and directories.

The Linux filesystem allows the owners of objects to determine the access rights
that subjects have to them. What type of access control does Linux use? - ANSWER-
✅✅Discretionary Access Control

Mary's organization handles very sensitive governmental agency information. They
need to implement an access control system that allows administrators to set access
rights but does not allow the delegation of those rights to other users. What is the
best type of access control design for Mary's organization? - ANSWER-
✅✅Mandatory Access Control (MAC) systems allow an administrator to configure
access permissions but do not allow users to delegate permission to others.

What term is used to describe the default set of privileges assigned to a user when a
new account is created?
A. Aggregation
B. Transitivity
C. Baseline
D. Entitlement - ANSWER-✅✅D. Entitlement refers to the privileges granted to
useres when an account is first provisioned.

Steve is the risk manager for a company on the east coast of the United States. He
recently undertook a replacement cost analysis and determined that rebuilding and
reconfiguring the data center would cost $20 million. Steve consulted with hurricane
experts, data center specialists, and structural engineers and they determined that a
typical CAT 3 hurricane that successfully hits the east coast would cause
approximately $5 million in damages. The meteorologists determined that Steve's
facility lies in an area where they are likely to experience a CAT 3 hurricane once
every 10 years.

Based upon the information in this scenario, what is the exposure factor for the
effect of a CAT 3 hurricane on Steve's data center? - ANSWER-✅✅The exposure
factor is the percentage of the facility that risk managers expect will be damaged if a
risk materializes. It is calculated by dividing the amount of damage by the asset value.
In this case, that is $5 million in damage divided by the $20 million facility value, or
25 percent.

Steve is the risk manager for a company on the east coast of the United States. He
recently undertook a replacement cost analysis and determined that rebuilding and
reconfiguring the data center would cost $20 million. Steve consulted with hurricane
experts, data center specialists, and structural engineers and they determined that a
typical CAT 3 hurricane that successfully hits the east coast would cause
approximately $5 million in damages. The meteorologists determined that Steve's
facility lies in an area where they are likely to experience a CAT 3 hurricane once
every 10 years.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BRILLIANTSOLUTIONS St Johns River State College Orange Park
View profile
Follow You need to be logged in order to follow users or courses
Sold
56
Member since
2 year
Number of followers
2
Documents
2723
Last sold
3 days ago
A+SCIENCE SOLUTIONS HUB

GET THE LATEST EXPERTLY SOLVED REVISION,ACTUAL EXAMS,FINAL ,MID-TERM EXAMS AND RETAKES EXAM MATERIALS IN ALL SCIENCE COURSES AT AN AFFORDABLE PRICE.

3.1

7 reviews

5
2
4
1
3
1
2
2
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions