100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU C725 UPDATED ACTUAL Exam Questions and CORRECT ANSWERS

Puntuación
-
Vendido
-
Páginas
21
Grado
A+
Subido en
14-10-2024
Escrito en
2024/2025

WGU C725 UPDATED ACTUAL Exam Questions and CORRECT ANSWERS Code of Ethics Canons' described under 'Protect society, the commonwealth, and the infrastructure - CORRECT ANSWER- 1. Promote and preserve public trust and confidence in information and systems. 2. Promote the understanding and acceptance of prudent information security measures. 3. Preserve and strengthen the integrity of the public infrastructure. 4. Discourage unsafe practice. Role Based Access Control (RBAC) - CORRECT ANSWER- A Role Based Access Control (RBAC) model can group users into roles based on the organization's hierarchy, and it is a nondiscretionary access control model. A nondiscretionary access control model uses a central authority to determine which objects that subjects can access

Mostrar más Leer menos
Institución
WGU C725
Grado
WGU C725










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU C725
Grado
WGU C725

Información del documento

Subido en
14 de octubre de 2024
Número de páginas
21
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Vista previa del contenido

WGU C725 UPDATED ACTUAL Exam
Questions and CORRECT ANSWERS
Code of Ethics Canons' described under 'Protect society, the commonwealth, and the
infrastructure - CORRECT ANSWER✔✔- 1. Promote and preserve public trust and
confidence in information and systems. 2. Promote the understanding and acceptance of
prudent information security measures. 3. Preserve and strengthen the integrity of the public
infrastructure. 4. Discourage unsafe practice.


Role Based Access Control (RBAC) - CORRECT ANSWER✔✔- A Role Based Access
Control (RBAC) model can group users into roles based on the organization's hierarchy, and
it is a nondiscretionary access control model. A nondiscretionary access control model uses a
central authority to determine which objects that subjects can access.


The preventions to reduce the potential for data breach are: - CORRECT ANSWER✔✔- 1.
Support for controls from management 2. Policies based on business objectives 3. A complete
understanding of the types of control required 4. A cost analysis of controls and cost
assessment of a potential breach 5. Employee security education, training, and awareness


Capability tables - CORRECT ANSWER✔✔- Capability tables are created for each subject,
and they identify the objects that the subject can access. It includes the authorization rights of
the access control subject such as read, write, execute, and so on.


ACLs (access control lists) - CORRECT ANSWER✔✔- ACLs (access control lists) are lists
of subjects that are authorized to access a specific object.


access control matrix - CORRECT ANSWER✔✔- An access control matrix is a table that
includes subjects, objects, and assigned privileges.


Aggregation - CORRECT ANSWER✔✔- Aggregation is a process in which a user collects
and combines information from various sources to obtain complete information. The
individual parts of information are at the correct sensitivity, but the combined information is
not. A user can combine information available at a lower privilege, thereby reducing the
information at a higher privilege level.

,inference attacks - CORRECT ANSWER✔✔- inference attacks, where the subject deduces
the complete information about an object from the bits of information collected through
aggregation. Therefore, inference is the ability of a subject to derive implicit information. A
protection mechanism to limit inferencing of information in statistical database queries is
specifying a minimum query set size, but prohibiting the querying of all but one of the
records in the database.


Polyinstantiation - CORRECT ANSWER✔✔- Polyinstantiation, also known as data
contamination, is used to conceal classified information that exists in a database and to fool
intruders. Polyinstantiation ensures that users with lower access level are not able to access
and modify data categorized for a higher level of access in a multi-level database.
Polyinstantiation can be used to reduce data inference violations. When polyinstantiation is
implemented, two objects are created by using the same primary keys. One object is filled
with incorrect information and is deemed unclassified, and the other object contains the
original classified information. When a user with lower level privileges attempts to access the
object, the user is directed to the object containing incorrect information. Polyinstantiation is
concerned with the same primary key existing at different classification levels in the same
database.


Scavenging - CORRECT ANSWER✔✔- Scavenging, also referred to as browsing, involves
looking for information without knowing its format. Scavenging is searching the data residue
in a system to gain unauthorized knowledge of sensitive data.


Identification - CORRECT ANSWER✔✔- Identification is the method used by a user or
process to claim who they are or to assert who they claim to be. Identification involved
supplying your user name, account number, or some other form of personal identification. It
is the means by which a user provides a claim of his or her identity to a system.


Authentication - CORRECT ANSWER✔✔- Authentication is the process of being
recognized by a system. Authentication involves supplying a second piece of information,
such as a password, that is checked against a database for accuracy. If this piece of
information matches the stored information, the subject is authenticated. It is the testing or
reconciliation of evidence of a user's identity.


Components of the Common Criteria protection profile - CORRECT ANSWER✔✔- The
protection profile contains a set of security requirements including functionality and
assurance criteria for a product and the rationale behind such requirements. The
corresponding evaluation assurance level (EAL) rating intended for the product is also
specified. The environmental conditions, the expected functional, the assurance levels, and
the product objectives are also included in the protection profile when the product is

, evaluated by the Common Criteria for a target evaluation rating. Evaluation tests are
performed for the targeted rating awarded to the target of evaluation, and the results are
verified before granting an EAL rating to the intended product. Components of the Common
Criteria protection profile include Target of Evaluation (TOE) description, threats against the
product that must be addressed, and security objectives.


RADIUS - CORRECT ANSWER✔✔- RADIUS is a AAA protocol that provides
authentication, authorization, and accounting services. It centralizes authentication for remote
dial-up connections. It is used when an organization has more than one remote access server.


Which policies provide protection against remote maintenance PBX attacks? - CORRECT
ANSWER✔✔- 1. Turn off the remote maintenance features when not needed. 2. Use strong
authentication on the remote maintenance ports. 3. Keep PBX terminals in a locked, restricted
area. 4. Replace or disable embedded logins and passwords.


Rijndael cipher - CORRECT ANSWER✔✔- The Rijndael cipher uses the 128-bit key, 192-
bit key, or 256-bit key. In this cipher, the number of encryption rounds depends on the key
length. If a 128-bit key is used, then 9 rounds of encryption take place. If a 192-bit key is
used, then 11 rounds of encryption take place, and similarly, if a 256-bit key is used, then 13
rounds of encryption take place.


stream cipher - CORRECT ANSWER✔✔- A stream cipher is a symmetric key cipher that
operates on each character, or bit of a message. It encrypts one character per bit at a time.
Caesar cipher and one-time pad are the examples of a stream cipher.


block cipher - CORRECT ANSWER✔✔- A block cipher is a symmetric key cipher that
operates on blocks of messages. It encrypts an entire message block at the same time.
Transposition ciphers are examples of block ciphers. Each block cipher has a mode of
operation that functions as a stream cipher.


transposition cipher - CORRECT ANSWER✔✔- a transposition cipher is a method of
encryption by which the positions held by units of plaintext (which are commonly characters
or groups of characters) are shifted according to a regular system, so that the ciphertext
constitutes a permutation of the plaintext.


Cache memory - CORRECT ANSWER✔✔- Cache memory is memory that is used for high-
speed transfer of data. Data in cache can be accessed by the CPU more quickly than data
located in random access memory (RAM).
$10.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
MGRADES Stanford University
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1121
Miembro desde
1 año
Número de seguidores
104
Documentos
68962
Última venta
6 horas hace
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

178 reseñas

5
76
4
31
3
47
2
9
1
15

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes