Improve your search results. Select your educational institution and subject so that we can show you the most relevant documents and help you in the best way possible.
Ok, I understand!
Your school or university
Improve your search results. Select your educational institution and subject so that we can show you the most relevant documents and help you in the best way possible.
A combined mail server and calendaring server environment contains no secure sockets layer (SSL) certificate.



Which security principle of the CIA triad is affected by the lack of an SSL certificate?



A Confidentiality

B Integrity

C Authentication

D Availability CORRECT ANSWERS: A



A company does not have a disaster recovery plan (DRP) and suffers a multiday power outage.



Which provisioning should the company perform to provide stable power for a long period of time?



A Purchase g...
WGU Master's Course C795 - Cybersecurity Management II Tactical| 270 QUESTIONS| 56 PAGES| WITH COMPLETE SOLUTIONS UPDATED 2023
Last document update:
ago
A combined mail server and calendaring server environment contains no secure sockets layer (SSL) certificate.



Which security principle of the CIA triad is affected by the lack of an SSL certificate?



A Confidentiality

B Integrity

C Authentication

D Availability CORRECT ANSWERS: A



A company does not have a disaster recovery plan (DRP) and suffers a multiday power outage.



Which provisioning should the company perform to provide stable power for a long period of time?



A Purchase g...
A combined mail server and calendaring server environment contains no secure sockets layer (SSL) certificate.Which security principle of the CIA triad is affected by the lack of an SSL certificate? CORRECT ANSWERS: Confidentiality



A company does not have a disaster recovery plan (DRP) and suffers a multiday power outage. Which provisioning should the company perform to provide stable power for a long period of time? CORRECT ANSWERS: Purchase generators



A company is moving its database ba...
Cybersecurity Management II - Tactical - C795 Preassessment QUESTIONS WITH COMPLETE SOLUTIONS
Last document update:
ago
A combined mail server and calendaring server environment contains no secure sockets layer (SSL) certificate.Which security principle of the CIA triad is affected by the lack of an SSL certificate? CORRECT ANSWERS: Confidentiality



A company does not have a disaster recovery plan (DRP) and suffers a multiday power outage. Which provisioning should the company perform to provide stable power for a long period of time? CORRECT ANSWERS: Purchase generators



A company is moving its database ba...
A company's main asset is a physical working prototype stored in the research and development department. The prototype is not currently connected to the company's network.



Which privileged user activity should be monitored?



a. Accessing camera logs

b. Adding accounts to the administrator group

c. Running scripts in PowerShell

d. Disabling host firewall CORRECT ANSWERS: a



A company performs a data audit on its critical information every six months. Company policy states that the ...
WGU C795 QUESTIONS WITH COMPLETE SOLUTIONS
Last document update:
ago
A company's main asset is a physical working prototype stored in the research and development department. The prototype is not currently connected to the company's network.



Which privileged user activity should be monitored?



a. Accessing camera logs

b. Adding accounts to the administrator group

c. Running scripts in PowerShell

d. Disabling host firewall CORRECT ANSWERS: a



A company performs a data audit on its critical information every six months. Company policy states that the ...
A technician notifies her supervisor that the nightly backup of a critical system failed during the previous night's run. Because the system is critical to the organization, the technician raised the issue in order to make management aware of the missing backup. The technician is looking for guidance on whether additional actions should be taken on the single backup failure.



Which role is responsible for making the final decision on how to handle the incomplete backup?



a. Senior managem...
C795 Security Architecture – Tactical questions with complete solutions
Last document update:
ago
A technician notifies her supervisor that the nightly backup of a critical system failed during the previous night's run. Because the system is critical to the organization, the technician raised the issue in order to make management aware of the missing backup. The technician is looking for guidance on whether additional actions should be taken on the single backup failure.



Which role is responsible for making the final decision on how to handle the incomplete backup?



a. Senior managem...
As an IT security professional, you have just been hired by a multisite automotive dealership to protect and manage its computer network. What is your first task in establishing a secure defense system for the company?This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A



Hire a system security vendor.

B



Perform a full vulnerability assessment.

C



Perform an asset inventory and classification audit.

D

...
C795 Cybersecurity Management II – Tactical questions with complete solutions
Last document update:
ago
As an IT security professional, you have just been hired by a multisite automotive dealership to protect and manage its computer network. What is your first task in establishing a secure defense system for the company?This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A



Hire a system security vendor.

B



Perform a full vulnerability assessment.

C



Perform an asset inventory and classification audit.

D

...
____________ subjects are granted only the privileges necessary to perform assigned work tasks and no more. Keep in mind that privilege in this context includes both permissions to data and rights to perform tasks on systems. CORRECT ANSWERS: The principle of least privilege states that



____________ ensures that no single person has total control over a critical function or system. This is necessary to ensure that no single person can compromise the system or its security. CORRECT ANSWERS: ...
Cybersecurity Management II - Tactical - C795 SOBs| 85 questions| with complete solutions
Last document update:
ago
____________ subjects are granted only the privileges necessary to perform assigned work tasks and no more. Keep in mind that privilege in this context includes both permissions to data and rights to perform tasks on systems. CORRECT ANSWERS: The principle of least privilege states that



____________ ensures that no single person has total control over a critical function or system. This is necessary to ensure that no single person can compromise the system or its security. CORRECT ANSWERS: ...
WGU C795 Study Guide - Passed first try. ProTip: Read the CONTEXT of the test question.( QUESTIONS WITH COMPLETE SOLUTIONS)
WGU C795 Study Guide - Passed first try. ProTip: Read the CONTEXT of the test question.( QUESTIONS WITH COMPLETE SOLUTIONS)
Last document update:
ago
OOM (Object-oriented modeling): CORRECT ANSWERS: It is heavily used by both OOA and OOD activities in modern software engineering.



ISO/IEC 20000 Family



ISO27001 -

ISO27002 -

ISO27005 -

ISO -

ISO - CORRECT ANSWERS: ISO27001 - Requirements

ISO27002 - Code of Practice

ISO27005 - Risk Management

ISO - Digital Evidence

ISO - Electronic Delivery



CIA triad (Confidentiality, Integrity, Availability)



All Security functions Begin with Policy CORRECT ANSWERS: Confidentiality - Pro...
As you read this, a fellow student has made another $4.70
How did he do that? By selling his study resources on Stuvia. Try it yourself!
Discover all about earning on Stuvia