100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU Course C845 - Information Systems Security (SSCP) || with Error-free Answers.

Rating
-
Sold
-
Pages
481
Grade
A+
Uploaded on
24-12-2025
Written in
2025/2026

WGU Course C845 - Information Systems Security (SSCP) || with Error-free Answers.WGU Course C845 - Information Systems Security (SSCP) || with Error-free Answers.WGU Course C845 - Information Systems Security (SSCP) || with Error-free Answers.WGU Course C845 - Information Systems Security (SSCP) || with Error-free Answers.

Show more Read less
Institution
WGU C845
Course
WGU C845











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C845
Course
WGU C845

Document information

Uploaded on
December 24, 2025
Number of pages
481
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • wgu course c845

Content preview

WGU Course C845 - Information Systems Security
(SSCP) || with Error-free Answers.

Which of the following is a symmetric algorithm?


A Diffie-Hellman

B RSA

C AES
D HMAC correct answers C



How can a user be given the power to set privileges on an object for other users when within a
DAC operating system?


A Remove special permissions for the user on the object.

B Grant the user full control over the object.

C Give the user the modify privilege on the object.

D Issue an administrative job label to the user. correct answers B



Your company adopts a new end-user security awareness program. This training includes
malware introduction, social media issues, password guidelines, data exposure, and lost devices.
How often should end users receive this training?



A once a year and upon termination

B upon new hire and once a year thereafter

C upon termination

D twice a year
E upon new hire

,F once a year correct answers B



What type of event is more likely to trigger the business continuity plan (BCP) rather than the
disaster recovery plan (DRP)?



A A port-scanning event against your public servers in the DMZ

B A security breach of an administrator account
C Several users failing to remember their logon credentials

D A level 5 hurricane correct answers B



What is the IEEE standard known as port-based network access control which is used to leverage
authentication already present in a network to validate clients connecting over hardware devices,
such as wireless access points or VPN concentrators?



A IEEE 802.1x

B IEEE 802.15

C IEEE 802.3

D IEEE 802.11 correct answers A


Why is change control and management used as a component of software asset management?



A To stop changes from being implemented into an environment

B To oversee the asset procurement process

C To prevent or reduce unintended reduction in security

D To restrict the privileges assigned to compartmentalized administrators correct answers C


What is the cost benefit equation?

,A [ALE1 - ALE2] - CCM

B AES - CCMP

C total initial risk - countermeasure benefit

D AV x EF x ARO correct answers A



What is the best means to restore the most current form of data when a backup strategy is based
on starting each week off with a full backup followed by a daily differential?


A Restore the initial week's full backup and then the last differential backup before the failure.


B Restore only the last differential backup.



C Restore the initial week's full backup and then each differential backup up to the failure.


D Restore the last differential backup and then the week's full backup. correct answers A



Which of the following is not considered an example of a non-discretionary access control
system?


A MAC

B ACL

C ABAC

D RBAC correct answers B


How should countermeasures be implemented as part of the recovery phase of incident response?



A During next year's security review
B Based on the lowest cost among available options

, C As defined by the current security policy

D As determined by the violation that occurred correct answers D



Remote control malware was found on a client device, and an unknown attacker was
manipulating the network from afar. The attack resulted in the network switches reverting to
flooding mode, thereby enabling the attacker to eavesdrop on a significant portion of network
communications. After reviewing IDS and traffic logs, you determine that this was accomplished
by an attack utility which generated a constant Ethernet frames with random source MAC
addresses. What can be done to prevent this attack from occurring in the future?


A Restrict access to DHCP.

B Use a static HOSTS file.

C Use MAC limiting on the switch ports.

D Implement an ARP monitor. correct answers C



How is quantitative risk analysis performed?


A Through the Delphi technique

B With scenario-based assessments

C Using calculations
D Via employee interviews correct answers C



What special component on a motherboard can be used to securely store the encryption key for
whole drive encryption?



A CMOS
B RAM

C TPM
D CPU correct answers C

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Wisdoms Strayer University
View profile
Follow You need to be logged in order to follow users or courses
Sold
577
Member since
1 year
Number of followers
64
Documents
6385
Last sold
2 days ago
REALITIEXAM:

I am a leader in online test prep. I take great pride in our tests and their ability to help you pass your exams. feel free to contact :

4.6

286 reviews

5
223
4
33
3
10
2
8
1
12

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions