100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU Information Security And Assurance (C725) SET III: Questions & Solutions

Rating
-
Sold
-
Pages
17
Grade
A+
Uploaded on
10-11-2024
Written in
2024/2025

WGU Information Security And Assurance (C725) SET III: Questions & Solutions

Institution
WGU C725
Course
WGU C725










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C725
Course
WGU C725

Document information

Uploaded on
November 10, 2024
Number of pages
17
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU Information Security And Assurance (C725) SET
III: Questions & Solutions

A job title: Have access to information resources in accordance with the
owner-defined controls and access rules. Right Ans - Users

One purpose of a security awareness program is to modify which of the
following?

A. Employees' attitudes and behaviors
B. Management's approach
C. Attitudes of employees toward sensitive data
D. Corporate attitudes about safeguarding data Right Ans - A. Employees'
attitudes and behaviors

Explanation:

Because people are the weakest link in any security-related process, it's
crucial that a security program address user education, awareness, and
training on policies and procedures that affect them.

The totality of protection mechanisms within a computer system, including
hardware, firmware, and software. It consists of one or more components that
together enforce a unified security policy over a product or system Right
Ans - Trusted Computing Base (TCB)

A software model that mediates all access from any subject (user or other
device) to any object (resource, data, and so forth);

it cannot be bypassed.It mediates accesses to objects by subjects. In principle,
it should be:

Complete, to mediate every access

Isolated from modification by other system entities (objects and processes)

,Verifiable, doing only what it's programmed to do and not being susceptible to
circumvention by malicious acts or programmer error Right Ans -
reference monitor

a.k.a. abstract machine

Implementation of a reference monitor for a specific hardware base, such as
Sun Solaris, Red Hat Linux, or Mac OS X. Right Ans - security kernel

The TCB, reference monitor, and security kernel are essential for military- and
government-grade information technology (IT) security to prevent
unauthorized access or threats to the integrity of programs, operating
systems, or data.

T or F

In "The ring of trust" Trust in a system moves from the outside to the inside in
a unidirectional mode. Right Ans - True

T or F

Multics was the first operating system to provide a hierarchical file system
Right Ans - True

Which of the following terms best defines the sum of protection mechanisms
inside the computer, including hardware, firmware, and software?

A . Trusted system
B .Security kernel
C. Trusted computing base
D. Security perimeter Right Ans - C. Trusted computing base

Explanation:

The Trusted Computing Base (TCB) is the totality of protection mechanisms
within a computer system, including hardware, firmware, and software.

A TCB practice in which a design objective in which each process has its own
distinct address space for its application code and data. Such a design makes it

, possible to prevent each process from accessing another process's data. This
prevents data or information leakage and prevents modification of the data
while in memory. Right Ans - Process isolation

A TCB practice in which a process (program) have no more privilege than
what it really needs to perform its functions. Any modules that require
supervisor or root access (that is, complete system privileges) are embedded
in the operating system kernel. The kernel handles all requests for system
resources and mediates the access from external modules to privileged
modules when required. Right Ans - The principle of least privilege

A TCB practice in which specifically relates to the segmentation of memory
into protected segments. The kernel allocates the required amount of memory
for the process to load its application code, its process data, and its application
data. The system prevents user processes from accessing another process's
allocated memory. It also prevents user processes from accessing system
memory. Right Ans - Hardware segmentation

A TCB practice in which process operation that is divided into layers by
function. Each layer deals with a specific activity. The lower (outer) layers
perform basic tasks, whereas the higher (inner) layers perform more complex
or protected tasks. Right Ans - Layering

A TCB practice in which a process that defines a specific set of permissible
values for an object and the operations that are permissible on that object.
This involves ignoring or separating implementation details to concentrate on
what is important to maintain security. Right Ans - Abstraction

A TCB practice in which a mechanism used to ensure that information
available at one processing level is not available in another, regardless of
whether it is higher or lower. It is also a concept in the object-oriented
programming (OOP) technique when information is encapsulated within an
object and can be directly manipulated only by the services provided within
the object. Right Ans - Data hiding

a.k.a. information hiding

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Krisella Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
833
Member since
3 year
Number of followers
673
Documents
6477
Last sold
5 days ago
\"Study Smarter, Achieve Greater.\"

Welcome, this is the perfect place to find the study materials you need to thrive academically. Think of it as your personal study sanctuary—where you can access well-organized, comprehensive, and easy-to-understand notes that help you learn with confidence. I understand how challenging studying can be, which is why I’ve made it my mission to provide you with the best resources to simplify your learning journey. Whether you’re tackling difficult subjects, preparing for exams, or just looking to strengthen your understanding, my carefully crafted study guides, notes, and summaries are designed to meet your unique academic needs. Just like a cozy nest, I want my page to be your go-to space for knowledge, growth, and success. With resources that are clear, concise, and insightful, you’ll feel confident and prepared every step of the way. Thank you for trusting this page with your academic success. Let’s build a foundation for your learning and help you soar to new heights!

Read more Read less
4.2

171 reviews

5
102
4
27
3
21
2
8
1
13

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions