100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C845 – (ISC)² CERTIFIED IN CYBERSECURITY (CC) STUDY GUIDE WITH PRACTICE 250 QUESTIONS AND VERIFIED ANSWERS FOR 2025 OA AND EXAM PREP WITH MOST TESTED QUESTIONS GRADED A+

Rating
-
Sold
-
Pages
50
Grade
A+
Uploaded on
24-12-2025
Written in
2025/2026

WGU C845 – (ISC)² CERTIFIED IN CYBERSECURITY (CC) STUDY GUIDE WITH PRACTICE 250 QUESTIONS AND VERIFIED ANSWERS FOR 2025 OA AND EXAM PREP WITH MOST TESTED QUESTIONS GRADED A+

Institution
WGU C845
Course
WGU C845











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C845
Course
WGU C845

Document information

Uploaded on
December 24, 2025
Number of pages
50
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C845 – (ISC)² CERTIFIED IN CYBERSECURITY (CC) STUDY GUIDE
WITH PRACTICE 250 QUESTIONS AND VERIFIED ANSWERS FOR 2025
OA AND EXAM PREP WITH MOST TESTED QUESTIONS GRADED A+
WGU C845 PREPARES STUDENTS FOR THE (ISC)² CERTIFIED IN CYBERSECURITY (CC) EXAM,
FOCUSING ON FOUNDATIONAL SECURITY KNOWLEDGE INCLUDING RISK MANAGEMENT,
NETWORK DEFENSE, INCIDENT RESPONSE, AND ACCESS CONTROL. THIS RESOURCE OFFERS
PRACTICE QUESTIONS AND CONCEPT REVIEWS ALIGNED WITH THE 2025 EXAM DOMAINS
AND OA STRUCTURE. IDEAL FOR STUDENTS PURSUING ENTRY-LEVEL CYBERSECURITY
CERTIFICATION AND CAREER READINESS.



A system that collects transactional information and stores it in a record in order to show which
users performed which actions is an example of providing . (D1, L1.1.1)

A) Non-repudiation

B) Multifactor authentication

C) Biometrics

D) Privacy - CORRECT ANSWER-A) Non-repudiation



In risk management concepts, a(n) is something or someone that poses risk to an
organization or asset. (D1, L1.2.1)

A) Fear

B) Threat

C) Control

D) Asset - CORRECT ANSWER-B) Threat



A software firewall is an application that runs on a device and prevents specific types of traffic from
entering that device. This is a type of control. (D1, L1.3.1)

A) Physical

B) Administrative

C) Passive

D) Technical - CORRECT ANSWER-D) Technical



Tina is an (ISC)² member and is invited to join an online group of IT security enthusiasts. After
attending a few online sessions, Tina learns that some participants in the group are sharing malware

,with each other, in order to use it against other organizations online. What should Tina do? (D1,
L1.5.1)

A) Nothing

B) Stop participating in the group

C) Report the group to law enforcement

D) Report the group to (ISC)² - CORRECT ANSWER-B) Stop participating in the group



What type of network is most often used to connect peripherals to computers and mobile devices?

A) Wi-Fi

B) Bluetooth

C) WAN

D) LAN - CORRECT ANSWER-B) Bluetooth



Which one of the following ports is not normally used by email systems?

A) 25

B) 139

C) 110

D) 143 - CORRECT ANSWER-B) 139 - NetBIOS



What technology provides the translation that assigns public IP addresses to privately addressed
systems that wish to communicate on the Internet?

A) TLS

B) HTTP

C) SSL

D) NAT - CORRECT ANSWER-D) NAT



What command may be used to determine the network path between two locations?

A) tracert

B) ping

C) arp

D) dig - CORRECT ANSWER-A) tracert

,Brad is configuring a new wireless network for his small business. What wireless security standard
should he use?

A) WPA

B) WEP2

C) WPA2

D) WEP - CORRECT ANSWER-C) WPA2



How many components does Malware have?

A) 1

B) 2

C) 4

D) 9 - CORRECT ANSWER-B) 2

1. Propagation Mechanism

2. Payload



What is the best way to protect against viruses?

A) User Education

B) Patching

C) NIDS

D) Fences - CORRECT ANSWER-A) User Education



steal computing power, network bandwidth, and storage capacity.

A) Blockchains

B) Virus

C) Botnets

D) Spyware - CORRECT ANSWER-C) Botnets



attacks exploit flaws in browsers and browser plugins.

A) Man-in-the-Browser

B) Man-in-the-Middle

, C) Man-in-the-Connection

D) Man-in-the-Know j- jCORRECT jANSWER-A) jMan-in-the-Browser



tricks jbrowsers jinto jusing junencrypted jcommunications.

A) Spoofing

B) SSL jStripping

C) HTTP jMasquerade

D) Detour jAttack j- jCORRECT jANSWER-B) jSSL jStripping



use jexternally jforced jerrors.

A) Fault jInjection jAttacks

B) Reverse jEngineering

C) SQL jInjections

D) XSS j- jCORRECT jANSWER-A) jFault jInjection jAttacks



What jtype jof jmalware jspreads junder jits jown jpower?

A) Worm

B) Spyware

C) Virus

D) Trojan jhorse j- jCORRECT jANSWER-A) jWorm



Which jone jof jthe jfollowing jtechniques jis juseful jin jpreventing jreplay jattacks?

A) Man-in-the-middle

B) Full jdisk jencryption

C) Session jtokens

D) Mobile jdevice jmanagement j- jCORRECT jANSWER-C) jSession jtokens



monitor jnetwork jtraffic jfor jsigns jof jmalicious jactivity.

A) IDS

B) Firewall

C) Anti-Virus

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Wisdoms Strayer University
View profile
Follow You need to be logged in order to follow users or courses
Sold
577
Member since
1 year
Number of followers
64
Documents
6385
Last sold
2 days ago
REALITIEXAM:

I am a leader in online test prep. I take great pride in our tests and their ability to help you pass your exams. feel free to contact :

4.6

286 reviews

5
223
4
33
3
10
2
8
1
12

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions