• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

SET 9 SSCP practice questions WGU C845

Latest WGU Jan 16, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

SET 9 SSCP practice questions WGU C845 Leave the first rating Students also studied Terms in this set (86) Science Computer Science Computer Security and Reliability Save C839v5/D334 Additional Practice Teacher 165 terms ShawnD_Preview D278 Exam Prep 53 terms Sergeantsavage1 Preview C839v5/D334 Algorithms Drill Teacher 51 terms ShawnD_Preview WGU - 85 terms Pon Which of the following type of cryptography is used when both parties use the same key to communicate securely with each other?

  • Symmetric Key Cryptography
  • PKI - Public Key Infrastructure
  • Diffie-Hellman
  • DSS - Digital Signature Standard
  • Symmetric Key Cryptography
  • Which of the following is true of network security?

  • A firewall is a not a necessity in today's connected
  • world.

  • A firewall is a necessity in today's connected world.
  • A whitewall is a necessity in today's connected world.
  • A black firewall is a necessity in today's connected
  • world.

  • A firewall is a necessity in today's connected world.
  • What is called the access protection system that limits connections by calling back the number of a previously authorized location?

  • Sendback systems
  • Callback forward systems
  • Callback systems
  • Sendback forward systems
  • callback systems
  • What is a decrease in amplitude as a signal propagates along a transmission medium best known as?

  • Crosstalk
  • Noise
  • Delay distortion
  • Attenuation
  • Attenuation

Which device acting as a translator is used to connect two networks or applications from layer 4 up to layer 7 of the ISO/OSI Model?

  • Bridge
  • Repeater
  • Router
  • Gateway
  • gateway
  • In which layer of the OSI Model are connection-oriented protocols located in the TCP/IP suite of protocols?

  • Transport layer
  • Application layer
  • Physical layer
  • Network layer
  • Transport layer
  • Which of the following is a telecommunication device that translates data from digital to analog form and back to digital?

  • Multiplexer
  • Modem
  • Protocol converter
  • Concentrator
  • Modem
  • Which of the following transmission media would NOT be affected by cross talk or interference?

  • Copper cable
  • Radio System
  • Satellite radiolink
  • Fiber optic cables
  • Fiber optic cables
  • What is called an attack where the attacker spoofs the source IP address in an ICMP ECHO broadcast packet so it seems to have originated at the victim's system, in order to flood it with REPLY packets?

  • SYN Flood attack
  • Smurf attack
  • Ping of Death attack
  • Denial of Service (DOS) attack
  • smurf attack
  • What is the main difference between a Smurf and a Fraggle attack?

  • A Smurf attack is ICMP-based and a Fraggle attack is
  • UDP-based.

  • A Smurf attack is UDP-based and a Fraggle attack is
  • TCP-based.

  • Smurf attack packets cannot be spoofed.
  • A Smurf attack is UDP-based and a Fraggle attack is
  • ICMP-based.

  • A Smurf attack is ICMP-based and a Fraggle attack is UDP-based.

Why are coaxial cables called "coaxial"?

  • it includes two physical channels that carries the signal
  • surrounded (after a layer of insulation) by another concentric physical channel, both running along the same axis.

  • it includes one physical channel that carries the signal
  • surrounded (after a layer of insulation) by another concentric physical channel, both running along the same axis

  • it includes two physical channels that carries the signal
  • surrounded (after a layer of insulation) by another two concentric physical channels, both running along the same axis.

  • it includes one physical channel that carries the signal
  • surrounded (after a layer of insulation) by another concentric physical channel, both running perpendicular and along the different axis

  • it includes one physical channel that carries the signal surrounded (after a layer
  • of insulation) by another concentric physical channel, both running along the same axis The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers does NOT have which of the following characteristics?

  • Standard model for network communications
  • Used to gain information from network devices such as
  • count of packets received and routing tables

  • Enables dissimilar networks to communicate
  • Defines 7 protocol layers (a.k.a. protocol stack)
  • Used to gain information from network devices such as count of packets
  • received and routing tables In telephony different types of connections are being used. The connection from the phone company's branch office to local customers is referred to as which of the following choices?

  • new loop
  • local loop
  • loopback
  • indigenous loop
  • local loop
  • Communications and network security relates to transmission of which of the following?

  • voice
  • voice and multimedia
  • data and multimedia
  • voice, data and multimedia
  • voice and multimedia
  • One of the following statements about the differences between PPTP and L2TP is NOT true

  • PPTP can run only on top of IP networks.
  • PPTP is an encryption protocol and L2TP is not.
  • L2TP works well with all firewalls and network devices
  • that perform NAT.

  • L2TP supports AAA servers
  • L2TP works well with all firewalls and network devices that perform NAT.

You have been tasked to develop an effective information classification program. Which one of the following steps should be performed first?

  • Establish procedures for periodically reviewing the
  • classification and ownership

  • Specify the security controls required for each
  • classification level

  • Identify the data custodian who will be responsible for
  • maintaining the security level of data

  • Specify the criteria that will determine how data is
  • classified

  • Specify the criteria that will determine how data is classified
  • A group of independent servers, which are managed as a single system, that provides higher availability, easier

manageability, and greater scalability is:

  • server cluster
  • client cluster
  • guest cluster
  • host cluster
  • server cluster

A server cluster looks like a:

  • single server from the user's point of view
  • dual server from the user's point of view
  • triple server from the user's point of view
  • quardle server from the user's point of view
  • single server from the user's point of view
  • If any server in the cluster crashes, processing continues transparently, however, the cluster suffers some performance degradation. This implementation is

sometimes called a:

  • server farm
  • client farm
  • cluster farm
  • host farm
  • server farm
  • Which of the following is immune to the effects of electromagnetic interference (EMI) and therefore has a much longer effective usable length?

  • Fiber Optic cable
  • Coaxial cable
  • Twisted Pair cable
  • Axial cable
  • fiber optic cable
  • Which of the following methods of providing telecommunications continuity involves the use of an alternative media?

  • Alternative routing
  • Diverse routing
  • Long haul network diversity
  • Last mile circuit protection
  • alternative routing

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

This document featured detailed explanations that helped me ace my presentation. Such an remarkable resource!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 16, 2026
Description:

SET 9 SSCP practice questions WGU C845 Leave the first rating Students also studied Terms in this set Science Computer Science Computer Security and Reliability Save C839v5/D334 Additional Practice...

Unlock Now
$ 11.00