WGU Pre-Assessment Leave the first rating Students also studied Terms in this set (14) Science Computer Science Computer Security and Reliability Save Official (ISC)² SSCP 947 terms KL_MARIEPreview CISSP 1,453 terms pergusPreview Business of IT 311 terms Jeremy_Payne7 Preview
SSCP T
129 term sam Practice questions for this set Learn1 / 7Study using Learn How does an attribute-based access control system determine if a subject can access an object?How does a web of trust model provide security since it does not involve a trusted third-party?Through consistency of serial numbers of self-issued certificates Choose an answer 1It checks the time of day and location. 2 It assesses the characteristics of the subject, object, and/or environment.3It verifies the user's login credentials.4It evaluates the user's role and permissions.Don't know?
You have been asked to help design the security awareness and training program for your company. Which of the following statements is NOT true regarding this program?Specialized technical training should be provided for executives.Which of the following options describes integrity? Preservation of internal and external consistency What component of an incident response policy clearly defines the laws and regulations that must be followed within the organization?Standards Policy How can organizations benefit from converged network communications?Reduced number of solution vendors and protocols Which of the following are security log event severity levels? (Choose all that apply.) Debug Notice Alert Warning Critical Emergency Error How does an attribute-based access control system determine if a subject can access an object?It assesses the characteristics of the subject, object, and/or environment.How does S/MIME provide for verification that a received message was not modified during transit?Through a digital signature How can someone new to the concept of virtualization quickly get a working guest OS running within a hypervisor?Use an appliance A Web service has been experiencing a significant increase in traffic due to a successful media announcement. However, in the chaos of new customers and an avalanche of orders, the site manager forgot to address the Web site's digital certificate. At this point, what process can the site manager perform to reuse his expired certificate?Reissue Which of the following is NOT a component of a cipher suite used by TLS?rotation cipher What is the database used to interpret the details of SNMP communications?MIB - Management Information Base How are managerial controls used to encourage compliance typically categorized?Directive
Which of the following network topologies offers the most redundancy and the greatest speed?Mesh