WGU, Information Security and Assurance (C725), SET III | 100 Questions with 100% Correct Answers
A job title: Have access to information resources in accordance with the owner-defined controls and access rules. - Users One purpose of a security awareness program is to modify which of the following? A. Employees' attitudes and behaviors B. Management's approach C. Attitudes of employees toward sensitive data D. Corporate attitudes about safeguarding data - A. Employees' attitudes and behaviors Explanation: Because people are the weakest link in any security-related process, it's crucial that a security program address user education, awareness, and training on policies and procedures that affect them. The totality of protection mechanisms within a computer system, including hardware, firmware, and software. It consists of one or more components that together enforce a unified security policy over a product or system - Trusted Computing Base (TCB) A software model that mediates all access from any subject (user or other device) to any object (resource, data, and so forth); it cannot be bypassed.It mediates accesses to objects by subjects. In principle, it should be: Complete, to mediate every access Isolated from modification by other system entities (objects and processes) Verifiable, doing only what it's programmed to do and not being susceptible to circumvention by malicious acts or programmer error - reference monitor a.k.a. abstract machine
Escuela, estudio y materia
- Institución
- Western Governors University
- Grado
- WGU, Information Security and Assurance
Información del documento
- Subido en
- 31 de agosto de 2022
- Número de páginas
- 14
- Escrito en
- 2022/2023
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
wgu
-
information security and assurance c725
-
set iii | 100 questions with 100 correct answers
Documento también disponible en un lote