SSCP - WGU - Pre-Assessment
Which term is used for the parameters set by web browsers that define the
supported encryption options negotiated during the establishment of a TLS-protected
connection? - ANSWER Cipher suites
As a defense contractor, Juan's company must comply with strict access control
regulations. Juan's supervisor tells him to implement an access control based on the
company's users' physical characteristics. Under which type of access security
would hand scanning and retina scanning fall? - ANSWER Biometrics
Which border device is used to perform NAT and content caching? - ANSWER Proxy
How can organizations benefit from converged network communications? -
ANSWER Reduced number of solution vendors and protocols
A certificate authority (CA) system is used to verify the identity of its customers. The
CA system allows general Internet users to access online resources and have some
level of knowledge about who the entities are that are hosting online content. For
example, a user can be confident in the identity of an online shopping site while
making a purchase. How is this benefit of verified identity achieved? - ANSWER
Trusted third-party
Which of the following network topographies offer the most redundancy and the
greatest speed? - ANSWER Mesh
What is the Exchange Principle as defined by Dr. Edmund Locard? - ANSWER
Anyone entering or leaving a crime scene will take something with them when they
leave and will leave something of themselves behind.
Physical, logical, and administrative are the three standard means of which the
following? - ANSWER Access control
What component of an incident response policy clearly defines the laws and
regulations that must be followed within the organization? - ANSWER Standards
Policy
Which of the following is a valid definition for privacy? - ANSWER Providing a means
of control of distribution of the information about an individual
In which of the following could a person gain too much control or power, and perform
fraud? - ANSWER Job rotation
What is the definition of risk? - ANSWER The probability or likelihood that an asset
will be harmed
What is the purpose of the user account maintenance mechanism known as account
lockout? - ANSWER To prevent password-guessing attacks from being successful
, Which of the following is any department or division of the US government required
to follow? - ANSWER FIPS
Why would an organization choose to accept risk? - ANSWER The risk is of a
tolerable level.
Which of the following options describes integrity? - ANSWER Preservation of
internal and external consistency
How can someone new to the concept of virtualization quickly get a working guest
OS running within a hypervisor? - ANSWER Use an appliance.
What is the name of the phase or step of an incident response policy that has the
goal of preventing further damage to the organization from a known incident? -
ANSWER Containment
What is the purpose of a WIPS? - ANSWER To detect rogue devices
Why would a system display last login notifications to users once they have
successfully entered their credentials? - ANSWER To alert users of potential account
logon violations
What is the purpose of continuous monitoring? - ANSWER To record all events that
may be related to a violation
What is an asset? - ANSWER Anything required to complete a business task
Francine is a director of accounting for Infosure Systems Corporation. She is
proposing that the company starts moving some accounting applications to a cloud
provider. She wants them to be accessible from various client devices through either
a thin client interface, such as a web browser, or a program interface. Which cloud
service model would best to use to accomplish the task? - ANSWER SaaS
Which of the following are examples of security log event severity levels? (Choose
all that apply.) - ANSWER Emergency
Critical
Warning
Alert
Notice
Debug
Error
Which of the following is the most volatile memory? - ANSWER CPU cache
What is a significant benefit of a HIDS installed on an endpoint system which is not
generally possible with a NIDS? - ANSWER Determine whether an attack was
successful.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller leonardmuriithi061. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $17.99. You're not tied to anything after your purchase.