WGU C795
Western Governers University
Page 2 out of 25 results
Sort by
-
WGU Master's Course C795 - Cybersecurity Management II Tactical |270 questions| with correct answers
- Exam (elaborations) • 87 pages • 2023
-
- $15.49
- + learn more
WGU Master's Course C795 - Cybersecurity Management II Tactical |270 questions| with correct answers
-
Cybersecurity Management II - Tactical - C795 Pre-assessment QUESTIONS WITH COMPLETE SOLUTIONS
- Exam (elaborations) • 15 pages • 2023
- Available in package deal
-
- $9.89
- + learn more
Cybersecurity Management II - Tactical - C795 Pre-assessment QUESTIONS WITH COMPLETE SOLUTIONS
-
WGU C795 Study Guide - Passed first try. ProTip: Read the CONTEXT of the test question.( QUESTIONS WITH COMPLETE SOLUTIONS)
- Exam (elaborations) • 20 pages • 2023
- Available in package deal
-
- $13.49
- 4x sold
- + learn more
OOM (Object-oriented modeling): CORRECT ANSWERS: It is heavily used by both OOA and OOD activities in modern software engineering. 
 
ISO/IEC 20000 Family 
 
ISO27001 - 
ISO27002 - 
ISO27005 - 
ISO - 
ISO - CORRECT ANSWERS: ISO27001 - Requirements 
ISO27002 - Code of Practice 
ISO27005 - Risk Management 
ISO - Digital Evidence 
ISO - Electronic Delivery 
 
CIA triad (Confidentiality, Integrity, Availability) 
 
All Security functions Begin with Policy CORRECT ANSWERS: Confidentiality - Pro...
-
C795- Cybersecurity Management II – Tactical| 261 QUESTIONS| WITH COMPLETE SOLUTIONS
- Exam (elaborations) • 22 pages • 2023
- Available in package deal
-
- $12.49
- + learn more
Security Tests CORRECT ANSWERS: Security tests verify that a control is functioning properly. These tests include automated scans, tool-assisted penetration tests, and manual attempts to undermine security. Security testing should take place on a regular schedule, with attention paid to each of the key security controls protecting an organization. 
 
Security Assessments CORRECT ANSWERS: Comprehensive reviews of the security of a system, application, or other tested environment. During a secur...
-
WGU C795 QUESTIONS WITH COMPLETE SOLUTIONS
- Exam (elaborations) • 16 pages • 2023
- Available in package deal
-
- $10.49
- + learn more
A company's main asset is a physical working prototype stored in the research and development department. The prototype is not currently connected to the company's network. 
 
Which privileged user activity should be monitored? 
 
a. Accessing camera logs 
b. Adding accounts to the administrator group 
c. Running scripts in PowerShell 
d. Disabling host firewall CORRECT ANSWERS: a 
 
A company performs a data audit on its critical information every six months. Company policy states that the ...
Want to regain your expenses?
-
C795 Security Architecture – Tactical questions with complete solutions
- Exam (elaborations) • 16 pages • 2023
- Available in package deal
-
- $12.49
- + learn more
A technician notifies her supervisor that the nightly backup of a critical system failed during the previous night's run. Because the system is critical to the organization, the technician raised the issue in order to make management aware of the missing backup. The technician is looking for guidance on whether additional actions should be taken on the single backup failure. 
 
Which role is responsible for making the final decision on how to handle the incomplete backup? 
 
a. Senior managem...
-
C795 Cybersecurity Management II – Tactical questions with complete solutions
- Exam (elaborations) • 21 pages • 2023
- Available in package deal
-
- $12.49
- + learn more
As an IT security professional, you have just been hired by a multisite automotive dealership to protect and manage its computer network. What is your first task in establishing a secure defense system for the company?This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. 
A 
 
Hire a system security vendor. 
B 
 
Perform a full vulnerability assessment. 
C 
 
Perform an asset inventory and classification audit. 
D 
...
-
Cybersecurity Management II - Tactical - C795 SOBs| 85 questions| with complete solutions
- Exam (elaborations) • 14 pages • 2023
- Available in package deal
-
- $10.49
- + learn more
____________ subjects are granted only the privileges necessary to perform assigned work tasks and no more. Keep in mind that privilege in this context includes both permissions to data and rights to perform tasks on systems. CORRECT ANSWERS: The principle of least privilege states that 
 
____________ ensures that no single person has total control over a critical function or system. This is necessary to ensure that no single person can compromise the system or its security. CORRECT ANSWERS: ...
-
C795- Cybersecurity Management II (Tactical)| 166 questions| with complete solutions
- Exam (elaborations) • 13 pages • 2023
- Available in package deal
-
- $10.49
- + learn more
What is a vulnerability? CORRECT ANSWERS: a weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. 
 
What is a penetration test? CORRECT ANSWERS: a simulated cyber attack against your systems or company 
 
What are the typical steps for a vulnerability test? CORRECT ANSWERS: Identify asset classification list, identify vulnerabilities, test assets against vulnerabilities, and recommend solut...
-
Cybersecurity Management II - Tactical - C795 CISSP 14,15,16,17,18 Questions with complete solutions
- Exam (elaborations) • 9 pages • 2023
- Available in package deal
-
- $10.49
- + learn more
Question 1 :Which of the following best describes an implicit deny principle? CORRECT ANSWERS: All actions that are not expressly allowed are denied. 
 
What is the intent of least privilege? CORRECT ANSWERS: Enforce the most restrictive rights required by users to complete assigned tasks. 
 
Question 3 :A table includes multiple objects and subjects and it identifies the specific access each subject has to different objects. What is this table? CORRECT ANSWERS: Access control matrix 
 
Quest...
How much did you already spend on Stuvia? Imagine there are plenty more of you out there paying for study notes, but this time YOU are the seller. Ka-ching! Discover all about earning on Stuvia