WGU Master's Course C726 - Cybersecurity Architecture and Engineering | with COMPLETE SOLUTION
Which Orange Book level is considered mandatory protections and is based on the BellLaPadula security model? A A B C C D D B - D During an XOR operation, two bits are combined. Both values are the same. What will be the result of this combination? A 1 B 0 C OR D X - B Which section of the Minimum Security Requirements for Multi-User Operating System (NISTIR 5153) document addresses end-to-end user accountability? A access control B audit C data integrity D system integrity - B Which encryption algorithm is based on the Diffie-Hellman key agreement? A Knapsack B International Data Encryption Algorithm C El Gamal D HAVAL - C What is meant by the term fail-safe? A system's ability to switch over to a backup system in the event of a failure B system's ability to preserve a secure state before and after failure C system's ability to recover automatically through a reboot D system's ability to terminate processes when a failure is identified - DYou need to store some magnetic storage devices in a temporary storage facility. At which temperature could damage start to occur? A 350 degrees Fahrenheit B 100 degrees Fahrenheit C 90 degrees Fahrenheit D 175 degrees Fahrenheit - B You need to decrypt a file that is encrypted using asymmetric encryption. What should be used to decrypt the file? A public key B plaintext C message digest D private key - D Which statement is true of the Rijndael algorithm? A Rijndael uses variable block lengths and variable key lengths. B Rijndael uses fixed block lengths and fixed key lengths. C Rijndael uses variable block lengths and fixed key lengths. D Rijndael uses fixed block lengths and variable key lengths. - A You are responsible for managing the virtual computers on your network. Which guideline is important when managing virtual computers? A Update the operating system and applications only on the host computer. B Implement a firewall only on the host computer. C Install and update the antivirus program only on the host computer. D Isolate the host computer and each virtual computer from each other. - D Given two messages, M1 and M2, what is the LEAST likely outcome when using the same one-way hash function, H, to encrypt the messages?
Written for
Document information
- Uploaded on
- August 31, 2022
- Number of pages
- 17
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
wgu masters course c726 cybersecurity architecture and engineering | with complete solution