100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

C836 - Fundamentals of Information Security (WGU) with 100% all correct answers updated 2024.

Rating
-
Sold
-
Pages
27
Uploaded on
06-11-2024
Written in
2024/2025

*Integrity axiom - ANSWER-Anyone accessing a resource can only write its contents to one classified at the same level or lower. 3DES - ANSWER-is simply DES used to encrypt each block three times, each time with a different key. DES can operate in several different block modes, including Cipher Block Chaining (CBC), Electronic CodeBook (ECB), Cipher Feedback (CFB), Output Feedback (OFB), and Counter Mode (CTR). Each mode changes the way encryption functions and the way errors are handled. Access control lists (ACLs) - ANSWER-are lists containing information about what kind of access certain parties are allowed to have to a given system. Access control lists generally list which three kinds of permissions - ANSWER-read, write, and execute Access Controls are - ANSWER-tools and systems used to allow or deny access, limit access, or revoke access Access controls can be based on - ANSWER-physical attributes, sets of rules, lists of individuals or systems, or other, more complex factors Accountability - ANSWER-refers to making sure that a person is responsible for their actions. It provides us with the means to trace activities in our environment back to their source. Accountability depends on - ANSWER-identification, authentication, and access control being present so that we can know who a given transaction is associated with, and what permissions were used to allow them to carry it out. Administrative Controls - ANSWER-based on laws, rules, policies, and procedures, guidelines, and other items that are "paper" in nature. They are the policies that organizations create for governance. For example, acceptable use and email use policies. AES - ANSWER-is a set of symmetric block ciphers endorsed by the US government through NIST, and now used by a variety of other organizations, and is the replacement for DES as the standard encryption algorithm for the US federal government. AES uses three different ciphers: one with a 128-bit key, one with a 192-bit key, and one with a 256 bit key, all having a block length of 128 bits. Shares the same block modes that DES uses and also includes other modes such as XEXbased Tweaked CodeBook,(TCB) mode. An audit is a kind of - ANSWER-assessment

Show more Read less
Institution
C836
Course
C836










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
C836
Course
C836

Document information

Uploaded on
November 6, 2024
Number of pages
27
Written in
2024/2025
Type
Exam (elaborations)
Contains
Unknown

Subjects

Content preview

C836 - Fundamentals of Information
Security (WGU) with 100% all correct
answers updated 2024.
*Integrity axiom - ANSWER-Anyone accessing a resource can only write its contents to one
classified at the same level or lower.



3DES - ANSWER-is simply DES used to encrypt each block three times, each time with a different
key. DES can operate in several different block modes, including Cipher Block Chaining (CBC),
Electronic CodeBook (ECB), Cipher Feedback (CFB), Output Feedback (OFB), and Counter Mode
(CTR). Each mode changes the way encryption functions and the way errors are handled.



Access control lists (ACLs) - ANSWER-are lists containing information about what kind of access
certain parties are allowed to have to a given system.



Access control lists generally list which three kinds of permissions - ANSWER-read, write, and
execute



Access Controls are - ANSWER-tools and systems used to allow or deny access, limit access, or
revoke access



Access controls can be based on - ANSWER-physical attributes, sets of rules, lists of individuals or
systems, or other, more complex factors



Accountability - ANSWER-refers to making sure that a person is responsible for their actions. It
provides us with the means to trace activities in our environment back to their source.



Accountability depends on - ANSWER-identification, authentication, and access control being
present so that we can know who a given transaction is associated with, and what permissions
were used to allow them to carry it out.



Administrative Controls - ANSWER-based on laws, rules, policies, and procedures, guidelines, and
other items that are "paper" in nature. They are the policies that organizations create for
governance. For example, acceptable use and email use policies.

,AES - ANSWER-is a set of symmetric block ciphers endorsed by the US government through NIST,
and now used by a variety of other organizations, and is the replacement for DES as the standard
encryption algorithm for the US federal government. AES uses three different ciphers: one with a
128-bit key, one with a 192-bit key, and one with a 256 bit key, all having a block length of 128 bits.
Shares the same block modes that DES uses and also includes other modes such as XEXbased
Tweaked CodeBook,(TCB) mode.



An audit is a kind of - ANSWER-assessment



An iris-scan for access is what kind of authentication - ANSWER-Something you are



Anti-Malware Tools - ANSWER-applications detect threats in the same way as an IDS either by
matching against a signature or by detecting anomalous activities taking place.



Arbitrary Code Execution in database security - ANSWER-We can find a number of areas for security
flaws in the languages we use to talk to databases. Generally, these are concentrated on SQL, as it
is the most common database language in use. In the default SQL language, a number of built-in
elements are possible security risks, some of which we can control access to and some of which we
cannot. Defend against by using current software patches. Mandate secure coding practices.
Conduct internal reviews to ensure practices are being followed.



Asymmetric Cryptography - ANSWER-In this Cryptography a Key Pair - Private and Public Key is
used. Private Key is kept secret and the Public Key is widely distributed.



Attacks - ANSWER-interception, interruption, modification, and

fabrication



Attribute-based access control (ABAC) - ANSWER-This is an access control paradigm whereby access
rights are granted to users with policies that combine attributes together. Subject, resource,
environmental, physical



Auditing - ANSWER-the methodical examination and review of an organization's records



Authentication - ANSWER-the act of providing who or what we claim to be. More technically, the
set of methods used to establish whether a claim is true

, Authentication Attacks - ANSWER-gaining access to resources without the proper credentials to do
so. Having weak password requirements. Hard-coded passwords, using all-clear script message to
allow access all provide exploitation methods. Any such process that is

performed in a space where it might be subject to direct attack or manipulation by users is almost

guaranteed to be a security issue at some point. We should instead authenticate against a remote

server or on the hardware of the device, if we have a portable device, where we are considerably

more in control.



Authenticity - ANSWER-whether you've attributed the data in question to the proper owner or
creator. (altered email that says it's from one person when it's not - violation of the authenticity of
the email)



Authorization - ANSWER-The process of determining exactly what an authenticated party can do



Availability - ANSWER-Refers to the ability to access our data when we need it



Bell-LaPadula model - ANSWER-implements a combination of DAC and MAC and is primarily
concerned with the confidentiality of the resource in question. Generally, in cases where we see
DAC and MAC implemented together, MAC takes precedence over DAC, and DAC works within the
accesses allowed by the MAC permissions.



Biba Model - ANSWER-An access control model used to ensure integrity. It uses two primary rules:
no read down and no write up.



Block Cipher - ANSWER-takes a predetermined number of bits, known as a block, in the plaintext
message and encrypts that block. Blocks are commonly composed of 64 bits but can be larger or
smaller depending on the particular algorithm being used and the various modes in which the
algorithm might be capable of operating.



Brewer and Nash Model - ANSWER-also known as the Chinese Wall model, is an access control
model designed to prevent conflicts of interest.



Buffer overlow - ANSWER-an attack that works by inputting more data than an application is
expecting from a particular input—for example, by entering 1000 characters into a field that was
only expecting 10. Depending on how the application was written, we may find that the extra 990
characters are written somewhere into memory, perhaps over memory locations used by other
$23.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
aliciabernado2001

Get to know the seller

Seller avatar
aliciabernado2001 Columbia International University
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
1 year
Number of followers
0
Documents
89
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions