Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

WGU C845 SSCP EXAM STUDY GUIDE INFORMATION SYSTEM SECURITY WITH COMPLETE SOLUTIONS

Puntuación
-
Vendido
-
Páginas
10
Grado
A+
Subido en
24-12-2025
Escrito en
2025/2026

WGU C845 SSCP EXAM STUDY GUIDE INFORMATION SYSTEM SECURITY This guide covers essential SSCP topics organized into logical sections. Each section includes core concepts, best practices, and comparisons where needed. I. Security Fundamentals & Access Control 1. Configuration Management & Access Control Models ● Configuration Management Practice ○ Purpose: Maintain system integrity via version control, audits, and baseline settings. ○ Key Focus: Change management processes and accurate configuration documentation. ● Access Control Models ○ Decentralized (Discretionary Access Control – DAC): Local decisions at the resource level; users manage their own permissions. ○ Mandatory Access Control (MAC): Centralized, strict policies defined by the organization. ○ Role-Based Access Control (RBAC): Access based on a user’s role within the organization. ○ Additional Methods: ■ Capability Tables: Map subjects (users/processes) to permitted operations on objects. ■ Access Control Lists (ACLs): Collections of Access Control Entries (ACEs) that specify allowed or denied permissions. ● Device Authentication & Administrative Shares ○ Device Authentication: Uses certificates, tokens, or cryptographic keys to verify a device’s identity. ○ Administrative Shares: Hidden network shares (e.g., C$, ADMIN$) used for remote management (note: these pose security risks if not managed properly). 2. Account Management ● Steps in Account Management: ○ Provisioning: Create accounts with appropriate roles and permissions. ○ Modification: Update accounts as roles or job functions change. ○ Deactivation/Deletion: Disable or remove accounts that are no longer needed. ○ Periodic Review: Regularly audit account permissions and activity. ○ Password/Authentication Management: Enforce strong credentials and consider using shadow password systems (storing hashed passwords in secure files like /etc/shadow on UNIX/Linux). II. Network Security 1. VPNs and WiFi Security ● VPN Protocols: ○ ESP (Encapsulating Security Payload): Provides encryption (with optional authentication). ○ AH (Authentication Header): Provides authentication and integrity without encryption. ○ MBSA: A Microsoft tool that scans for security misconfigurations and missing updates. ● WiFi Security: ○ WEP: Insecure due to weak encryption and predictable initialization vectors. ○ WPA (with TKIP): Improved over WEP but has known vulnerabilities. ○ WPA2/WPA3: Use AES encryption and robust key management (with WPA3 offering enhanced security). 2. Firewalls, NAT, and Network Protocols ● Types of Firewalls: ○ Traditional Architectures: ■ Single-tier: One firewall (e.g., typical home router). ■ Two-tier: Perimeter firewall with a Demilitarized Zone (DMZ). ■ Three-tier: Adds an internal firewall for extra protection. ○ Other Types: ■ Packet Filtering Firewalls ■ Stateful Inspection Firewalls ■ Proxy-Based Firewalls ■ Next-Generation Firewalls (NGFW) ● Network Address Translation (SNAT): ○ SNAT (Source NAT): Translates private IP addresses to a public IP address for outbound traffic. ● Additional Network Technologies: ○ MPLS (Multi-Protocol Label Switching): Improves routing efficiency and traffic management. ○ FCoE (Fibre Channel over Ethernet): Converges storage and data networks, carrying Fibre Channel traffic over Ethernet.

Mostrar más Leer menos
Institución
WGU C845 SSCP INFORMATION SYSTEM
Grado
WGU C845 SSCP INFORMATION SYSTEM

Vista previa del contenido

lOMoAR cPSD| 60399657




WGU C845 SSCP EXAM STUDY GUIDE
INFORMATION SYSTEM SECURITY
This guide covers essential SSCP topics organized into logical sections. Each section includes core
concepts, best practices, and comparisons where needed.




I. Security Fundamentals & Access Control
1. Configuration Management & Access Control Models
● Configuration Management Practice
○ Purpose: Maintain system integrity via version control, audits, and baseline settings.
○ Key Focus: Change management processes and accurate configuration documentation.
● Access Control Models
○ Decentralized (Discretionary Access Control – DAC): Local decisions at the resource
level; users manage their own permissions.
○ Mandatory Access Control (MAC): Centralized, strict policies defined by the
organization.
○ Role-Based Access Control (RBAC): Access based on a user’s role within the
organization.
○ Additional Methods:
■ Capability Tables: Map subjects (users/processes) to permitted operations on
objects.
■ Access Control Lists (ACLs): Collections of Access Control Entries (ACEs)
that specify allowed or denied permissions. ● Device Authentication & Administrative Shares
○ Device Authentication: Uses certificates, tokens, or cryptographic keys to verify a device’s
identity.
○ Administrative Shares: Hidden network shares (e.g., C$, ADMIN$) used for remote
management (note: these pose security risks if not managed properly).

2. Account Management
● Steps in Account Management:
○ Provisioning: Create accounts with appropriate roles and permissions.
○ Modification: Update accounts as roles or job functions change.
○ Deactivation/Deletion: Disable or remove accounts that are no longer needed. ○
Periodic Review: Regularly audit account permissions and activity.

, lOMoAR cPSD| 60399657




○ Password/Authentication Management: Enforce strong credentials and consider using
shadow password systems (storing hashed passwords in secure files like /etc/shadow
on UNIX/Linux).




II. Network Security
1. VPNs and WiFi Security
● VPN Protocols:
○ ESP (Encapsulating Security Payload): Provides encryption (with optional
authentication).
○ AH (Authentication Header): Provides authentication and integrity without encryption.
○ MBSA: A Microsoft tool that scans for security misconfigurations and missing updates.
● WiFi Security:
○ WEP: Insecure due to weak encryption and predictable initialization vectors.
○ WPA (with TKIP): Improved over WEP but has known vulnerabilities.
○ WPA2/WPA3: Use AES encryption and robust key management (with WPA3 offering
enhanced security).

2. Firewalls, NAT, and Network Protocols
● Types of Firewalls:
○ Traditional Architectures:
■ Single-tier: One firewall (e.g., typical home router).
■ Two-tier: Perimeter firewall with a Demilitarized Zone (DMZ).
■ Three-tier: Adds an internal firewall for extra protection.
○ Other Types:
■ Packet Filtering Firewalls
■ Stateful Inspection Firewalls
■ Proxy-Based Firewalls
■ Next-Generation Firewalls (NGFW) ●
Network Address Translation (SNAT):
○ SNAT (Source NAT): Translates private IP addresses to a public IP address for outbound
traffic.
● Additional Network Technologies:
○ MPLS (Multi-Protocol Label Switching): Improves routing efficiency and traffic
management.
○ FCoE (Fibre Channel over Ethernet): Converges storage and data networks, carrying
Fibre Channel traffic over Ethernet.

Escuela, estudio y materia

Institución
WGU C845 SSCP INFORMATION SYSTEM
Grado
WGU C845 SSCP INFORMATION SYSTEM

Información del documento

Subido en
24 de diciembre de 2025
Número de páginas
10
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$11.99
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
IszackBd University Of Washington
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
22
Miembro desde
1 año
Número de seguidores
2
Documentos
4180
Última venta
13 horas hace
IszackBd Stuvia

Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers. We specialize on NURSING,WGU,ACLS USMLE,TNCC,PMHNP,ATI and other major courses, Updated Exam, Study Guides and Test banks. If you don't find any document you are looking for in this store contact us and we will fetch it for you in minutes, we love impressing our clients with our quality work and we are very punctual on deadlines. Please go through the sets description appropriately before any purchase and leave a review after purchasing so as to make sure our customers are 100% satisfied. FOR ANY REQUEST FEEL FREE TO REACH US

Lee mas Leer menos
3.0

2 reseñas

5
1
4
0
3
0
2
0
1
1

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes