100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C845 – (ISC)² CERTIFIED IN CYBERSECURITY (CC) STUDY GUIDE WITH PRACTICE 250 QUESTIONS AND VERIFIED ANSWERS FOR 2025 OA AND EXAM PREP WITH MOST TESTED QUESTIONS GRADED A+

Rating
-
Sold
-
Pages
50
Grade
A+
Uploaded on
28-06-2025
Written in
2024/2025

THIS DOCUMENT COVERS CORE TOPICS FOR WGU’S C845 COURSE AND THE (ISC)² CERTIFIED IN CYBERSECURITY (CC) CERTIFICATION. IT INCLUDES PRACTICE QUESTIONS AND VERIFIED ANSWERS FOCUSED ON SECURITY PRINCIPLES, ACCESS CONTROL, NETWORK SECURITY, RISK MANAGEMENT, AND INCIDENT RESPONSE. ALIGNED WITH THE 2025 OBJECTIVE ASSESSMENT (OA) AND THE OFFICIAL (ISC)² DOMAINS, THIS RESOURCE IS IDEAL FOR CYBERSECURITY STUDENTS AND PROFESSIONALS PREPARING FOR ENTRY-LEVEL CERTIFICATION

Show more Read less
Institution
WGU C845 – ² CERTIFIED IN CYBERSECURITY
Course
WGU C845 – ² CERTIFIED IN CYBERSECURITY











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C845 – ² CERTIFIED IN CYBERSECURITY
Course
WGU C845 – ² CERTIFIED IN CYBERSECURITY

Document information

Uploaded on
June 28, 2025
Number of pages
50
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C845 – (ISC)² CERTIFIED IN CYBERSECURITY (CC) STUDY GUIDE
WITH PRACTICE 250 QUESTIONS AND VERIFIED ANSWERS FOR 2025
OA AND EXAM PREP WITH MOST TESTED QUESTIONS GRADED A+
WGU C845 PREPARES STUDENTS FOR THE (ISC)² CERTIFIED IN CYBERSECURITY (CC) EXAM,
FOCUSING ON FOUNDATIONAL SECURITY KNOWLEDGE INCLUDING RISK MANAGEMENT,
NETWORK DEFENSE, INCIDENT RESPONSE, AND ACCESS CONTROL. THIS RESOURCE OFFERS
PRACTICE QUESTIONS AND CONCEPT REVIEWS ALIGNED WITH THE 2025 EXAM DOMAINS
AND OA STRUCTURE. IDEAL FOR STUDENTS PURSUING ENTRY-LEVEL CYBERSECURITY
CERTIFICATION AND CAREER READINESS.



A system that collects transactional information and stores it in a record in order to show which
users performed which actions is an example of providing ________. (D1, L1.1.1)

A) Non-repudiation

B) Multifactor authentication

C) Biometrics

D) Privacy - CORRECT ANSWER-A) Non-repudiation



In risk management concepts, a(n) ___________ is something or someone that poses risk to an
organization or asset. (D1, L1.2.1)

A) Fear

B) Threat

C) Control

D) Asset - CORRECT ANSWER-B) Threat



A software firewall is an application that runs on a device and prevents specific types of traffic from
entering that device. This is a type of ________ control. (D1, L1.3.1)

A) Physical

B) Administrative

C) Passive

D) Technical - CORRECT ANSWER-D) Technical



Tina is an (ISC)² member and is invited to join an online group of IT security enthusiasts. After
attending a few online sessions, Tina learns that some participants in the group are sharing malware

,with each other, in order to use it against other organizations online. What should Tina do? (D1,
L1.5.1)

A) Nothing

B) Stop participating in the group

C) Report the group to law enforcement

D) Report the group to (ISC)² - CORRECT ANSWER-B) Stop participating in the group



What type of network is most often used to connect peripherals to computers and mobile devices?

A) Wi-Fi

B) Bluetooth

C) WAN

D) LAN - CORRECT ANSWER-B) Bluetooth



Which one of the following ports is not normally used by email systems?

A) 25

B) 139

C) 110

D) 143 - CORRECT ANSWER-B) 139 - NetBIOS



What technology provides the translation that assigns public IP addresses to privately addressed
systems that wish to communicate on the Internet?

A) TLS

B) HTTP

C) SSL

D) NAT - CORRECT ANSWER-D) NAT



What command may be used to determine the network path between two locations?

A) tracert

B) ping

C) arp

D) dig - CORRECT ANSWER-A) tracert

,Brad is configuring a new wireless network for his small business. What wireless security standard
should he use?

A) WPA

B) WEP2

C) WPA2

D) WEP - CORRECT ANSWER-C) WPA2



How many components does Malware have?

A) 1

B) 2

C) 4

D) 9 - CORRECT ANSWER-B) 2

1. Propagation Mechanism

2. Payload



What is the best way to protect against viruses?

A) User Education

B) Patching

C) NIDS

D) Fences - CORRECT ANSWER-A) User Education



___________ steal computing power, network bandwidth, and storage capacity.

A) Blockchains

B) Virus

C) Botnets

D) Spyware - CORRECT ANSWER-C) Botnets



______________ attacks exploit flaws in browsers and browser plugins.

A) Man-in-the-Browser

B) Man-in-the-Middle

, C) Man-in-the-Connection

D) Man-in-the-Know - CORRECT ANSWER-A) Man-in-the-Browser



_________________ tricks browsers into using unencrypted communications.

A) Spoofing

B) SSL Stripping

C) HTTP Masquerade

D) Detour Attack - CORRECT ANSWER-B) SSL Stripping



________________________ use externally forced errors.

A) Fault Injection Attacks

B) Reverse Engineering

C) SQL Injections

D) XSS - CORRECT ANSWER-A) Fault Injection Attacks



What type of malware spreads under its own power?

A) Worm

B) Spyware

C) Virus

D) Trojan horse - CORRECT ANSWER-A) Worm



Which one of the following techniques is useful in preventing replay attacks?

A) Man-in-the-middle

B) Full disk encryption

C) Session tokens

D) Mobile device management - CORRECT ANSWER-C) Session tokens



_________________ monitor network traffic for signs of malicious activity.

A) IDS

B) Firewall

C) Anti-Virus

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
JAMES125 Chamberlain College Of Nursng
View profile
Follow You need to be logged in order to follow users or courses
Sold
340
Member since
2 year
Number of followers
42
Documents
3230
Last sold
3 days ago
MY MAIN GOAL IS TO MAKE YOU PASS GOOD LUCK

MY MAIN GOAL IS TO MAKE YOU PASS GOOD LUCK. As a dedicated nursing student with a passion for helping peers succeed, I specialize in providing high-quality study resources on STUVIA including ATI modules and other essential certifications, earning excellent ratings and a stellar reputation for boosting students' grades. My commitment to excellence

5.0

3104 reviews

5
3016
4
47
3
27
2
6
1
8

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions