100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C845 Practice Questions 2 Well Answered Latest Update 2025/2026

Rating
-
Sold
-
Pages
14
Grade
A+
Uploaded on
14-12-2025
Written in
2025/2026

WGU C845 Practice Questions 2 Well Answered Latest Update 2025/2026 Maintaining the hypervisor - Answers Bert is considering the use of an infrastructure as a service cloud computing partner to provide virtual servers. Which one of the following would be a vendor responsibility in this scenario? Maintaining the hypervisor Managing operating system security settings Maintaining the host firewall Configuring server access control Somewhere you are - Answers Callback to a landline phone number is an example of what type of factor? Something you know Somewhere you are Something you have Something you are Likelihood - Answers Renee is using encryption to safeguard sensitive business secrets when in transit over the Internet. What risk metric is she attempting to lower? Likelihood RTO MTO Impact Worm - Answers Kim is the system administrator for a small business network that is experiencing security problems. She is in the office in the evening working on the problem, and nobody else is there. As she is watching, she can see that systems on the other side of the office that were previously behaving normally are now exhibiting signs of infection. What type of malware is Kim likely dealing with? Virus Worm Trojan horse Logic bomb A bus and a ring - Answers What two logical network topologies can be physically implemented as a star topology? A bus and a mesh A ring and a mesh A bus and a ring It is not possible to implement other topologies as a star. Account review - Answers Jim has worked in human relations, payroll, and customer service roles in his company over the past few years. What type of process should his company perform to ensure that he has appropriate rights? Re-provisioning Account review Privilege creep Account revocation ICMP echo request - Answers What type of inbound packet is characteristic of a ping flood attack? ICMP echo request ICMP echo reply ICMP destination unreachable ICMP route changed Social engineering - Answers What penetration testing technique can best help assess training and awareness issues? Port scanning Discovery Social engineering Vulnerability scanning Encrypting the files - Answers GAD Systems is concerned about the risk of hackers stealing sensitive information stored on a file server. They choose to pursue a risk mitigation strategy. Which one of the following actions would support that strategy? Encrypting the files Deleting the files Purchasing cyber-liability insurance Taking no action Nonrepudiation; digital signatures - Answers Sally's organization needs to be able to prove that certain staff members sent emails, and she wants to adopt a technology that will provide

Show more Read less
Institution
C845
Course
C845









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
C845
Course
C845

Document information

Uploaded on
December 14, 2025
Number of pages
14
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C845 Practice Questions 2 Well Answered Latest Update 2025/2026

Maintaining the hypervisor - Answers Bert is considering the use of an infrastructure as a
service cloud computing partner to provide virtual servers.

Which one of the following would be a vendor responsibility in this scenario?



Maintaining the hypervisor

Managing operating system security settings

Maintaining the host firewall

Configuring server access control

Somewhere you are - Answers Callback to a landline phone number is an example of what type
of factor?



Something you know

Somewhere you are

Something you have

Something you are

Likelihood - Answers Renee is using encryption to safeguard sensitive business secrets when in
transit over the Internet.

What risk metric is she attempting to lower?



Likelihood

RTO

MTO

Impact

Worm - Answers Kim is the system administrator for a small business network that is
experiencing security problems.

She is in the office in the evening working on the problem, and nobody else is there.

, As she is watching, she can see that systems on the other side of the office that were
previously behaving normally are now exhibiting signs of infection.

What type of malware is Kim likely dealing with?



Virus

Worm

Trojan horse

Logic bomb

A bus and a ring - Answers What two logical network topologies can be physically implemented
as a star topology?



A bus and a mesh

A ring and a mesh

A bus and a ring

It is not possible to implement other topologies as a star.

Account review - Answers Jim has worked in human relations, payroll, and customer service
roles in his company over the past few years. What type of process should his company
perform to ensure that he has appropriate rights?



Re-provisioning

Account review

Privilege creep

Account revocation

ICMP echo request - Answers What type of inbound packet is characteristic of a ping flood
attack?



ICMP echo request

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
joshuawesonga22 Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
33
Member since
7 months
Number of followers
1
Documents
10577
Last sold
14 hours ago
Tutor Wes

Hi there! I'm Tutor Wes, a dedicated tutor with a passion for sharing knowledge and helping others succeed academically. All my notes are carefully organized, detailed, and easy to understand. Whether you're preparing for exams, catching up on lectures, or looking for clear summaries, you'll find useful study materials here. Let’s succeed together!

3.3

3 reviews

5
1
4
0
3
1
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions