WGU C845
Western Governors University
Page 2 out of 14 results
Sort by
-
WGU C845 - Information Systems Security (SSCP) Testbank | 1675 Questions with 100% Correct Answers | Verified | Latest Update | 586 Pages
- Exam (elaborations) • 586 pages • 2023
- Available in package deal
-
- $30.49
- + learn more
Which of the following is a symmetric algorithm? 
A Diffie-Hellman 
B RSA 
C AES 
D HMAC - C 
How can a user be given the power to set privileges on an object for other users when within a 
DAC operating system? 
A Remove special permissions for the user on the object. 
B Grant the user full control over the object. 
C Give the user the modify privilege on the object. 
D Issue an administrative job label to the user. - B 
Your company adopts a new end-user security awareness program. This traini...
-
WGU C845 SSCP Practice Questions | 500 Questions with 100% Correct Answers | Verified | Latest Update | 171 Pages
- Exam (elaborations) • 171 pages • 2023
- Available in package deal
-
- $26.49
- + learn more
What can be defined as a table of subjects and objects indicating what actions individual subjects 
can take upon individual objects? 
A. A capacity table 
B. An access control list 
C. An access control matrix 
D. A capability table - C. An Access Control Matrix 
Which access control model is best suited in an environment where a high security level is 
required and where it is desired that only the administrator grants access control? 
A. DAC 
B. MAC 
C. Access control matrix 
D. TACACS - B. M...
-
WGU C845 SSCP Pre-Assessment | 60 Questions with 100% Correct Answers | Verified | Latest Update
- Exam (elaborations) • 10 pages • 2023
- Available in package deal
-
- $12.49
- + learn more
Which term is used for the parameters set by web browsers that define the supported encryption 
options negotiated during the establishment of a TLS-protected connection? - Cipher suites 
As a defense contractor, Juan's company must comply with strict access control regulations. 
Juan's supervisor tells him to implement an access control based on the company's users' physical 
characteristics. Under which type of access security would hand scanning and retina scanning 
fall? - Biometrics 
Wh...
-
WGU C845 Practice Test C | 125 Questions with 100% Correct Answers | Verified | Latest Update | 67 Pages
- Exam (elaborations) • 67 pages • 2023
- Available in package deal
-
- $22.49
- + learn more
What form of VPN is based on a Transport-layer standard for encryption that is commonly used 
for Application-layer protocol protection? 
A 
PPTP VPN 
B 
L2TP VPN 
C 
SSL VPN 
D 
IPSec VPN - SSL VPN 
When using asymmetric cryptography, what is the purpose of using the recipient's public key to 
perform an encryption function on a data set before sending it to the recipient? 
A 
To support non-repudiation 
B 
To restrict delivery 
C 
To verify integrityD 
To prove the identity of the sender - To...
As you read this, a fellow student has made another $4.70
How did he do that? By selling his study resources on Stuvia. Try it yourself! Discover all about earning on Stuvia