100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

WGU C191 Module 5 Protection and Security Study guide Exam Questions with Key Marking Scheme Updated 2024/2025

Puntuación
-
Vendido
-
Páginas
20
Grado
A+
Subido en
16-10-2024
Escrito en
2024/2025

WGU C191 Module 5 Protection and Security Study guide Exam Questions with Key Marking Scheme Updated 2024/2025 A fragment of code embedded in a legitimate program - correct answer Virus In the UNIX operating system, a domain is associated with the ____. - correct answer user The most common method used by attackers to breach security is ____. - correct answer masquerading A code segment that misuses its environment is called ____. - correct answer a Trojan horse In an access matrix, the ____ right allows a process to change the entries in a row. - correct answer control Worms ____. - correct answer use the spawn mechanism to ravage system performance/can shut down an entire network/continue to grow as the Internet expands A denial of service attack is ____. - correct answer aimed at disrupting legitimate use of a system In a paired-password system, ____. - correct answer the computer supplies one part of a password and the user enters the other part In the reacquisition scheme for implementing the revocation of capabilities, ____. - correct answer capabilities are periodically deleted from each domain Which of the following is a true statement regarding the relative merits between access rights enforcement based solely on a kernel, as opposed to enforcement provided largely by a compiler? - correct answer Enforcement by the kernel is less flexible than enforcement by the programming language for user-defined policy. ____ layer security generally has been standardized on IPSec. - correct answer Network Secure - correct answer Protects the integrity of a system. A system whose resources are used and accessed as intended under all circumstances. Cracker - correct answer Someone attempting to breach security Threat - correct answer The potential for a security violation Attack - correct answer The attempt to break security DoS - correct answer An attack that attempts to disrupt or prevent legitimate use of a system

Mostrar más Leer menos
Institución
WGU C191
Grado
WGU C191










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU C191
Grado
WGU C191

Información del documento

Subido en
16 de octubre de 2024
Número de páginas
20
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU C191 Module 5 Protection and
Security Study guide Exam Questions
with Key Marking Scheme Updated
2024/2025

A fragment of code embedded in a legitimate program - correct answer Virus


In the UNIX operating system, a domain is associated with the ____. - correct answer
user


The most common method used by attackers to breach security is ____. - correct
answer masquerading


A code segment that misuses its environment is called ____. - correct answer a Trojan
horse


In an access matrix, the ____ right allows a process to change the entries in a row. -
correct answer control


Worms ____. - correct answer use the spawn mechanism to ravage system
performance/can shut down an entire network/continue to grow as the Internet expands


A denial of service attack is ____. - correct answer aimed at disrupting legitimate use
of a system


In a paired-password system, ____. - correct answer the computer supplies one part of
a password and the user enters the other part


In the reacquisition scheme for implementing the revocation of capabilities, ____. -
correct answer capabilities are periodically deleted from each domain

,Which of the following is a true statement regarding the relative merits between access
rights enforcement based solely on a kernel, as opposed to enforcement provided
largely by a compiler? - correct answer Enforcement by the kernel is less flexible than
enforcement by the programming language for user-defined policy.


____ layer security generally has been standardized on IPSec. - correct answer
Network
Secure - correct answer Protects the integrity of a system. A system whose resources
are used and accessed as intended under all circumstances.


Cracker - correct answer Someone attempting to breach security


Threat - correct answer The potential for a security violation


Attack - correct answer The attempt to break security


DoS - correct answer An attack that attempts to disrupt or prevent legitimate use of a
system


Trojan horse - correct answer A code segment that tries to misuse its environment


Virus - correct answer A fragment of code embedded in a legitimate program


Worm - correct answer Similar to virus but self replicates through out a network


Domain - correct answer Specifies resources a process may access. Specifies a set of
objects and the operations that may be invoked on those objects. Set of access rights.


Protection - correct answer a mechanism for controlling the access of programs,
processes, or users to the resources defined by a computer system.

, Security - correct answer requires not only an adequate protection of system but also
consideration of the external environment within which the system operates ( ie , threats
and attacks).


Breach of confidentiality - correct answer Getting a hold of information, credit card
numbers etc


Breach of integrity - correct answer Modify data


Breach of availability - correct answer Destruction of data


Theft of service - correct answer Unauthorized use of resources, Example-using a
server for your own file server


Trap door - correct answer hole purposely left in software program that only the
programmer is capable of using.


In unix the domain is associated with what? - correct answer the user


What is the most common method used by an attacker? - correct answer
Masquerading


Principle where just enough privilege is given to perform a task. - correct answer
Principle of least privilege


Principle where a process is only given access to resources it currently needs. - correct
answer Need to know principle


Rights needed to change entries in a column of an access matrix - correct answer
Copy and owner rights
$12.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
KieranKent55 NONE
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
41
Miembro desde
2 año
Número de seguidores
18
Documentos
6142
Última venta
1 mes hace

3.6

9 reseñas

5
4
4
1
3
2
2
0
1
2

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes