100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

C836 - Fundamentals of Information Security (WGU) with 100% all correct answers updated 2024.

Beoordeling
-
Verkocht
-
Pagina's
27
Geüpload op
06-11-2024
Geschreven in
2024/2025

*Integrity axiom - ANSWER-Anyone accessing a resource can only write its contents to one classified at the same level or lower. 3DES - ANSWER-is simply DES used to encrypt each block three times, each time with a different key. DES can operate in several different block modes, including Cipher Block Chaining (CBC), Electronic CodeBook (ECB), Cipher Feedback (CFB), Output Feedback (OFB), and Counter Mode (CTR). Each mode changes the way encryption functions and the way errors are handled. Access control lists (ACLs) - ANSWER-are lists containing information about what kind of access certain parties are allowed to have to a given system. Access control lists generally list which three kinds of permissions - ANSWER-read, write, and execute Access Controls are - ANSWER-tools and systems used to allow or deny access, limit access, or revoke access Access controls can be based on - ANSWER-physical attributes, sets of rules, lists of individuals or systems, or other, more complex factors Accountability - ANSWER-refers to making sure that a person is responsible for their actions. It provides us with the means to trace activities in our environment back to their source. Accountability depends on - ANSWER-identification, authentication, and access control being present so that we can know who a given transaction is associated with, and what permissions were used to allow them to carry it out. Administrative Controls - ANSWER-based on laws, rules, policies, and procedures, guidelines, and other items that are "paper" in nature. They are the policies that organizations create for governance. For example, acceptable use and email use policies. AES - ANSWER-is a set of symmetric block ciphers endorsed by the US government through NIST, and now used by a variety of other organizations, and is the replacement for DES as the standard encryption algorithm for the US federal government. AES uses three different ciphers: one with a 128-bit key, one with a 192-bit key, and one with a 256 bit key, all having a block length of 128 bits. Shares the same block modes that DES uses and also includes other modes such as XEXbased Tweaked CodeBook,(TCB) mode. An audit is a kind of - ANSWER-assessment

Meer zien Lees minder
Instelling
C836
Vak
C836










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
C836
Vak
C836

Documentinformatie

Geüpload op
6 november 2024
Aantal pagina's
27
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Onbekend

Onderwerpen

Voorbeeld van de inhoud

C836 - Fundamentals of Information
Security (WGU) with 100% all correct
answers updated 2024.
*Integrity axiom - ANSWER-Anyone accessing a resource can only write its contents to one
classified at the same level or lower.



3DES - ANSWER-is simply DES used to encrypt each block three times, each time with a different
key. DES can operate in several different block modes, including Cipher Block Chaining (CBC),
Electronic CodeBook (ECB), Cipher Feedback (CFB), Output Feedback (OFB), and Counter Mode
(CTR). Each mode changes the way encryption functions and the way errors are handled.



Access control lists (ACLs) - ANSWER-are lists containing information about what kind of access
certain parties are allowed to have to a given system.



Access control lists generally list which three kinds of permissions - ANSWER-read, write, and
execute



Access Controls are - ANSWER-tools and systems used to allow or deny access, limit access, or
revoke access



Access controls can be based on - ANSWER-physical attributes, sets of rules, lists of individuals or
systems, or other, more complex factors



Accountability - ANSWER-refers to making sure that a person is responsible for their actions. It
provides us with the means to trace activities in our environment back to their source.



Accountability depends on - ANSWER-identification, authentication, and access control being
present so that we can know who a given transaction is associated with, and what permissions
were used to allow them to carry it out.



Administrative Controls - ANSWER-based on laws, rules, policies, and procedures, guidelines, and
other items that are "paper" in nature. They are the policies that organizations create for
governance. For example, acceptable use and email use policies.

,AES - ANSWER-is a set of symmetric block ciphers endorsed by the US government through NIST,
and now used by a variety of other organizations, and is the replacement for DES as the standard
encryption algorithm for the US federal government. AES uses three different ciphers: one with a
128-bit key, one with a 192-bit key, and one with a 256 bit key, all having a block length of 128 bits.
Shares the same block modes that DES uses and also includes other modes such as XEXbased
Tweaked CodeBook,(TCB) mode.



An audit is a kind of - ANSWER-assessment



An iris-scan for access is what kind of authentication - ANSWER-Something you are



Anti-Malware Tools - ANSWER-applications detect threats in the same way as an IDS either by
matching against a signature or by detecting anomalous activities taking place.



Arbitrary Code Execution in database security - ANSWER-We can find a number of areas for security
flaws in the languages we use to talk to databases. Generally, these are concentrated on SQL, as it
is the most common database language in use. In the default SQL language, a number of built-in
elements are possible security risks, some of which we can control access to and some of which we
cannot. Defend against by using current software patches. Mandate secure coding practices.
Conduct internal reviews to ensure practices are being followed.



Asymmetric Cryptography - ANSWER-In this Cryptography a Key Pair - Private and Public Key is
used. Private Key is kept secret and the Public Key is widely distributed.



Attacks - ANSWER-interception, interruption, modification, and

fabrication



Attribute-based access control (ABAC) - ANSWER-This is an access control paradigm whereby access
rights are granted to users with policies that combine attributes together. Subject, resource,
environmental, physical



Auditing - ANSWER-the methodical examination and review of an organization's records



Authentication - ANSWER-the act of providing who or what we claim to be. More technically, the
set of methods used to establish whether a claim is true

, Authentication Attacks - ANSWER-gaining access to resources without the proper credentials to do
so. Having weak password requirements. Hard-coded passwords, using all-clear script message to
allow access all provide exploitation methods. Any such process that is

performed in a space where it might be subject to direct attack or manipulation by users is almost

guaranteed to be a security issue at some point. We should instead authenticate against a remote

server or on the hardware of the device, if we have a portable device, where we are considerably

more in control.



Authenticity - ANSWER-whether you've attributed the data in question to the proper owner or
creator. (altered email that says it's from one person when it's not - violation of the authenticity of
the email)



Authorization - ANSWER-The process of determining exactly what an authenticated party can do



Availability - ANSWER-Refers to the ability to access our data when we need it



Bell-LaPadula model - ANSWER-implements a combination of DAC and MAC and is primarily
concerned with the confidentiality of the resource in question. Generally, in cases where we see
DAC and MAC implemented together, MAC takes precedence over DAC, and DAC works within the
accesses allowed by the MAC permissions.



Biba Model - ANSWER-An access control model used to ensure integrity. It uses two primary rules:
no read down and no write up.



Block Cipher - ANSWER-takes a predetermined number of bits, known as a block, in the plaintext
message and encrypts that block. Blocks are commonly composed of 64 bits but can be larger or
smaller depending on the particular algorithm being used and the various modes in which the
algorithm might be capable of operating.



Brewer and Nash Model - ANSWER-also known as the Chinese Wall model, is an access control
model designed to prevent conflicts of interest.



Buffer overlow - ANSWER-an attack that works by inputting more data than an application is
expecting from a particular input—for example, by entering 1000 characters into a field that was
only expecting 10. Depending on how the application was written, we may find that the extra 990
characters are written somewhere into memory, perhaps over memory locations used by other
$23.49
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
aliciabernado2001

Maak kennis met de verkoper

Seller avatar
aliciabernado2001 Columbia International University
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
0
Lid sinds
1 jaar
Aantal volgers
0
Documenten
89
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen