100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C191: Operating Systems for Programmers. Exam 2025 Questions and Answers

Beoordeling
-
Verkocht
-
Pagina's
31
Cijfer
A+
Geüpload op
22-05-2025
Geschreven in
2024/2025

WGU C191: Operating Systems for Programmers. Exam 2025 Questions and Answers Secure - ANS Protects the integrity of a system. A system whose resources are used and accessed as intended under all circumstances. Cracker - ANS Someone attempting to breach security. Threat - ANS The potential for a security violation. Attack - ANS An attempt to break security. Denial-of-Service (DoS) - ANS An attack that attempts to disrupt or prevent legitimate use of a system. Trojan Horse - ANS A code segment that tries to misuse its environment. Virus - ANS A malicious fragment of code embedded in a legitimate program. Worm - ANS Similar to a virus, but self replicates throughout a network. Pg. 2 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED. Domain - ANS Specifies resources a process may access. Specifies a set of objects and the operations that may be invoked on those objects. Set of access rights. Protection - ANS A mechanism for controlling the access of programs, processes, or users to the resources defined by a computer system. Security - ANS Requires not only an adequate protection of system, but also consideration of the external environment within which the system operates (i.e., threats and attacks). Breach of Confidentiality - ANS Gaining access to information, credit card numbers, personal information, etc. Breach of Integrity - ANS Modified data. Breach of Availability - ANS Destruction of data. Theft of Service - ANS Unauthorized use of resources such as using a server as a personal file server. Trap Door - ANS A hole purposely left in a software program that only the programmer is capable of using. UNIX Domain Association - ANS A UNIX domain is associated with a user. Masquerading - ANS The most common method used by an attacker. Principle of Least Privilege - ANS Where just enough privilege is given to perform a task. Pg. 3 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED. Need-to-Know Principle - ANS Where a process is only given access to resources it currently needs. Copy and Owner Rights - ANS Rights needed to change entries in a column of an access matrix. Control Rights - ANS Rights needed to change entries in a row of an access matrix. Role-Based Access Control - ANS A type of control where privileges and programs are assigned roles, and users are assigned roles based on passwords. Compiler-Based Enforcement - ANS A type of enforcement where protection needs are declared rather than programmed. Kernel-Based Enforcement - ANS Enforcement provided by the subsystem designer. The 4 Levels of Security - ANS Physical - site must be secured. Human - only appropriate users have access. OS - system must be able to protect itself. Network - network must be secured. Logic Bomb - ANS A security incident initiated when certain logical conditions are met. Stack and Buffer Overflow - ANS A tactic used to gain access to a system by writing into the stack so that a return addr

Meer zien Lees minder
Instelling
WGU C191
Vak
WGU C191











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
WGU C191
Vak
WGU C191

Documentinformatie

Geüpload op
22 mei 2025
Aantal pagina's
31
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

WGU C191: Operating Systems for
Programmers. Exam 2025 Questions and
Answers




Secure - ANS Protects the integrity of a system. A system whose resources are used and
accessed as intended under all circumstances.



Cracker - ANS Someone attempting to breach security.



Threat - ANS The potential for a security violation.



Attack - ANS An attempt to break security.



Denial-of-Service (DoS) - ANS An attack that attempts to disrupt or prevent legitimate use of
a system.



Trojan Horse - ANS A code segment that tries to misuse its environment.



Virus - ANS A malicious fragment of code embedded in a legitimate program.



Worm - ANS Similar to a virus, but self replicates throughout a network.



Pg. 1 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.

,Domain - ANS Specifies resources a process may access. Specifies a set of objects and the
operations that may be invoked on those objects. Set of access rights.



Protection - ANS A mechanism for controlling the access of programs, processes, or users to
the resources defined by a computer system.



Security - ANS Requires not only an adequate protection of system, but also consideration of
the external environment within which the system operates (i.e., threats and attacks).



Breach of Confidentiality - ANS Gaining access to information, credit card numbers, personal
information, etc.



Breach of Integrity - ANS Modified data.



Breach of Availability - ANS Destruction of data.



Theft of Service - ANS Unauthorized use of resources such as using a server as a personal file
server.



Trap Door - ANS A hole purposely left in a software program that only the programmer is
capable of using.



UNIX Domain Association - ANS A UNIX domain is associated with a user.



Masquerading - ANS The most common method used by an attacker.



Principle of Least Privilege - ANS Where just enough privilege is given to perform a task.



Pg. 2 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.

,Need-to-Know Principle - ANS Where a process is only given access to resources it currently
needs.



Copy and Owner Rights - ANS Rights needed to change entries in a column of an access
matrix.



Control Rights - ANS Rights needed to change entries in a row of an access matrix.



Role-Based Access Control - ANS A type of control where privileges and programs are
assigned roles, and users are assigned roles based on passwords.



Compiler-Based Enforcement - ANS A type of enforcement where protection needs are
declared rather than programmed.



Kernel-Based Enforcement - ANS Enforcement provided by the subsystem designer.



The 4 Levels of Security - ANS Physical - site must be secured.
Human - only appropriate users have access.
OS - system must be able to protect itself.
Network - network must be secured.



Logic Bomb - ANS A security incident initiated when certain logical conditions are met.



Stack and Buffer Overflow - ANS A tactic used to gain access to a system by writing into the
stack so that a return address will specify malicious code to be run.




Pg. 3 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.

, Symmetric Encryption - ANS A type of encryption where the same key is used to encrypt and
decrypt.



Asymmetric Encryption - ANS A type of encryption where 2 different keys are used to
encrypt and decrypt.



Encryption - ANS Places constraints on the receivers.



Authentication - ANS Places constraints on the senders.



SSL - ANS Allows two computers to communicate securely.



Passwords - ANS The most common authentication mechanism.



Digital Certificate - ANS A public key that has been digitally signed by a certificate authority.



Paired Passwords - ANS One is provided by the system and the other is provided by the user.



Two-Factor Authentication - ANS Authentication using something you know and something
you have.



Intrusion Detection System (IDS) - ANS Detects attempted or successful intrusions into a
system or network.



Intrusion Prevention System (IPS) - ANS Detects and attempts to prevent an intrusion into a
system or network.



Port - ANS A connection point via which an OS communicates with a device.


Pg. 4 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
StarGuide Liberty University
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
16
Lid sinds
1 jaar
Aantal volgers
0
Documenten
2591
Laatst verkocht
1 week geleden
FIRST CLASS GALORE

Accurate Exam Study Materials.Verified And Updated By Professionals.

4.3

4 beoordelingen

5
1
4
3
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen