• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

WGU Course C845 - Information Systems Security SSCP

Latest WGU Jan 9, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

WGU Course C845 - Information Systems Security (SSCP) Quizlet by Brian MacFarlane 4.5 (4 reviews) Students also studied Terms in this set (1673) Western Governors UniversityD 333 Save C839v5/D334 Additional Practice Teacher 165 terms ShawnD_Preview Official (ISC)² SSCP 947 terms KL_MARIEPreview Introduction to Cryptography - D33...250 terms Square_Bubble Preview C839v5 Teacher Sha Which of the following is a symmetric algorithm?A Diffie-Hellman B RSA C AES

D HMAC

C How can a user be given the power to set privileges on an object for other users when within a DAC operating system?A Remove special permissions for the user on the object.B Grant the user full control over the object.C Give the user the modify privilege on the object.D Issue an administrative job label to the user.B Your company adopts a new end-user security awareness program. This training includes malware introduction, social media issues, password guidelines, data exposure, and lost devices. How often should end users receive this training?A once a year and upon termination B upon new hire and once a year thereafter C upon termination D twice a year E upon new hire F once a year B

What type of event is more likely to trigger the business continuity plan (BCP) rather than the disaster recovery plan (DRP)?A A port-scanning event against your public servers in the DMZ B A security breach of an administrator account C Several users failing to remember their logon credentials D A level 5 hurricane B What is the IEEE standard known as port-based network access control which is used to leverage authentication already present in a network to validate clients connecting over hardware devices, such as wireless access points or VPN concentrators?A IEEE 802.1x

B IEEE 802.15

C IEEE 802.3

D IEEE 802.11

A Why is change control and management used as a component of software asset management?A To stop changes from being implemented into an environment B To oversee the asset procurement process C To prevent or reduce unintended reduction in security D To restrict the privileges assigned to compartmentalized administrators C What is the cost benefit equation?

A [ALE1 - ALE2] - CCM

B AES - CCMP

C total initial risk - countermeasure benefit D AV x EF x ARO A What is the best means to restore the most current form of data when a backup strategy is based on starting each week off with a full backup followed by a daily differential?A Restore the initial week's full backup and then the last differential backup before the failure.B Restore only the last differential backup.C Restore the initial week's full backup and then each differential backup up to the failure.D Restore the last differential backup and then the week's full backup.A

Which of the following is not considered an example of a non-discretionary access control system?

A MAC B ACL

C ABAC

D RBAC

B How should countermeasures be implemented as part of the recovery phase of incident response?A During next year's security review B Based on the lowest cost among available options C As defined by the current security policy D As determined by the violation that occurred D Remote control malware was found on a client device, and an unknown attacker was manipulating the network from afar. The attack resulted in the network switches reverting to flooding mode, thereby enabling the attacker to eavesdrop on a significant portion of network communications. After reviewing IDS and traffic logs, you determine that this was accomplished by an attack utility which generated a constant Ethernet frames with random source MAC addresses. What can be done to prevent this attack from occurring in the future?A Restrict access to DHCP.B Use a static HOSTS file.C Use MAC limiting on the switch ports.D Implement an ARP monitor.C How is quantitative risk analysis performed?A Through the Delphi technique B With scenario-based assessments C Using calculations D Via employee interviews C What special component on a motherboard can be used to securely store the encryption key for whole drive encryption?

A CMOS

B RAM C TPM D CPU C

When is it appropriate to contact law enforcement when an organization experiences a security breach?A If a violation is more severe than just breaking company policy rules B If a breach of security occurs C If a tolerable or accepted risk is realized D If an insider uses another employee's credentials A What is the name of a cryptographic attack based on a database of pre-computed hash values and the original plaintext values?A Brute force attack B Rainbow table attack C Frequency analysis D Chosen plaintext attack B What is the purpose of a Security Information and Event Management (SIEM) product?A To provide real-time logging and analysis of security events B To define the requirements of security procedures C To provide event planning guidance for holding industry conferences D To improve employee security training A How does salting passwords reduce the likelihood that a password cracking attack will be successful?A It prevents automated attacks.B It forces the attacker to focus on one account at a time.C It triggers an account lockout after a fixed number of false attempts.D It increases the work load required to become successful.D Which of the following clearance levels or classification labels is not generally used in a government- or military- based MAC scheme?A Unclassified B Confidential C Top Secret D Proprietary D

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

The detailed explanations offered by this document helped me ace my presentation. A remarkable purchase!

Download Document

Buy This Document

$11.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Latest WGU
Added: Jan 9, 2026
Description:

WGU Course C845 - Information Systems Security (SSCP) Quizlet by Brian MacFarlane 4.5 (4 reviews) Students also studied Terms in this set Western Governors UniversityD 333 Save C839v5/D334 Addition...

Unlock Now
$ 11.00