100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU C191: Operating Systems for Programmers. Exam 2025 Questions and Answers

Puntuación
-
Vendido
-
Páginas
31
Grado
A+
Subido en
22-05-2025
Escrito en
2024/2025

WGU C191: Operating Systems for Programmers. Exam 2025 Questions and Answers Secure - ANS Protects the integrity of a system. A system whose resources are used and accessed as intended under all circumstances. Cracker - ANS Someone attempting to breach security. Threat - ANS The potential for a security violation. Attack - ANS An attempt to break security. Denial-of-Service (DoS) - ANS An attack that attempts to disrupt or prevent legitimate use of a system. Trojan Horse - ANS A code segment that tries to misuse its environment. Virus - ANS A malicious fragment of code embedded in a legitimate program. Worm - ANS Similar to a virus, but self replicates throughout a network. Pg. 2 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED. Domain - ANS Specifies resources a process may access. Specifies a set of objects and the operations that may be invoked on those objects. Set of access rights. Protection - ANS A mechanism for controlling the access of programs, processes, or users to the resources defined by a computer system. Security - ANS Requires not only an adequate protection of system, but also consideration of the external environment within which the system operates (i.e., threats and attacks). Breach of Confidentiality - ANS Gaining access to information, credit card numbers, personal information, etc. Breach of Integrity - ANS Modified data. Breach of Availability - ANS Destruction of data. Theft of Service - ANS Unauthorized use of resources such as using a server as a personal file server. Trap Door - ANS A hole purposely left in a software program that only the programmer is capable of using. UNIX Domain Association - ANS A UNIX domain is associated with a user. Masquerading - ANS The most common method used by an attacker. Principle of Least Privilege - ANS Where just enough privilege is given to perform a task. Pg. 3 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED. Need-to-Know Principle - ANS Where a process is only given access to resources it currently needs. Copy and Owner Rights - ANS Rights needed to change entries in a column of an access matrix. Control Rights - ANS Rights needed to change entries in a row of an access matrix. Role-Based Access Control - ANS A type of control where privileges and programs are assigned roles, and users are assigned roles based on passwords. Compiler-Based Enforcement - ANS A type of enforcement where protection needs are declared rather than programmed. Kernel-Based Enforcement - ANS Enforcement provided by the subsystem designer. The 4 Levels of Security - ANS Physical - site must be secured. Human - only appropriate users have access. OS - system must be able to protect itself. Network - network must be secured. Logic Bomb - ANS A security incident initiated when certain logical conditions are met. Stack and Buffer Overflow - ANS A tactic used to gain access to a system by writing into the stack so that a return addr

Mostrar más Leer menos
Institución
WGU C191
Grado
WGU C191











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU C191
Grado
WGU C191

Información del documento

Subido en
22 de mayo de 2025
Número de páginas
31
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU C191: Operating Systems for
Programmers. Exam 2025 Questions and
Answers




Secure - ANS Protects the integrity of a system. A system whose resources are used and
accessed as intended under all circumstances.



Cracker - ANS Someone attempting to breach security.



Threat - ANS The potential for a security violation.



Attack - ANS An attempt to break security.



Denial-of-Service (DoS) - ANS An attack that attempts to disrupt or prevent legitimate use of
a system.



Trojan Horse - ANS A code segment that tries to misuse its environment.



Virus - ANS A malicious fragment of code embedded in a legitimate program.



Worm - ANS Similar to a virus, but self replicates throughout a network.



Pg. 1 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.

,Domain - ANS Specifies resources a process may access. Specifies a set of objects and the
operations that may be invoked on those objects. Set of access rights.



Protection - ANS A mechanism for controlling the access of programs, processes, or users to
the resources defined by a computer system.



Security - ANS Requires not only an adequate protection of system, but also consideration of
the external environment within which the system operates (i.e., threats and attacks).



Breach of Confidentiality - ANS Gaining access to information, credit card numbers, personal
information, etc.



Breach of Integrity - ANS Modified data.



Breach of Availability - ANS Destruction of data.



Theft of Service - ANS Unauthorized use of resources such as using a server as a personal file
server.



Trap Door - ANS A hole purposely left in a software program that only the programmer is
capable of using.



UNIX Domain Association - ANS A UNIX domain is associated with a user.



Masquerading - ANS The most common method used by an attacker.



Principle of Least Privilege - ANS Where just enough privilege is given to perform a task.



Pg. 2 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.

,Need-to-Know Principle - ANS Where a process is only given access to resources it currently
needs.



Copy and Owner Rights - ANS Rights needed to change entries in a column of an access
matrix.



Control Rights - ANS Rights needed to change entries in a row of an access matrix.



Role-Based Access Control - ANS A type of control where privileges and programs are
assigned roles, and users are assigned roles based on passwords.



Compiler-Based Enforcement - ANS A type of enforcement where protection needs are
declared rather than programmed.



Kernel-Based Enforcement - ANS Enforcement provided by the subsystem designer.



The 4 Levels of Security - ANS Physical - site must be secured.
Human - only appropriate users have access.
OS - system must be able to protect itself.
Network - network must be secured.



Logic Bomb - ANS A security incident initiated when certain logical conditions are met.



Stack and Buffer Overflow - ANS A tactic used to gain access to a system by writing into the
stack so that a return address will specify malicious code to be run.




Pg. 3 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.

, Symmetric Encryption - ANS A type of encryption where the same key is used to encrypt and
decrypt.



Asymmetric Encryption - ANS A type of encryption where 2 different keys are used to
encrypt and decrypt.



Encryption - ANS Places constraints on the receivers.



Authentication - ANS Places constraints on the senders.



SSL - ANS Allows two computers to communicate securely.



Passwords - ANS The most common authentication mechanism.



Digital Certificate - ANS A public key that has been digitally signed by a certificate authority.



Paired Passwords - ANS One is provided by the system and the other is provided by the user.



Two-Factor Authentication - ANS Authentication using something you know and something
you have.



Intrusion Detection System (IDS) - ANS Detects attempted or successful intrusions into a
system or network.



Intrusion Prevention System (IPS) - ANS Detects and attempts to prevent an intrusion into a
system or network.



Port - ANS A connection point via which an OS communicates with a device.


Pg. 4 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.
$13.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
StarGuide Liberty University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
16
Miembro desde
1 año
Número de seguidores
0
Documentos
2591
Última venta
1 semana hace
FIRST CLASS GALORE

Accurate Exam Study Materials.Verified And Updated By Professionals.

4.3

4 reseñas

5
1
4
3
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes