100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

C836 - Fundamentals of Information Security (WGU) EXAM QUESTIONS WITH CORRECT ANSWERS||100%GUARANTEE D PASS||A+ GRADED!!||UPDATED 2025/2026||<LATEST VERSION>

Puntuación
-
Vendido
-
Páginas
29
Grado
A+
Subido en
21-11-2025
Escrito en
2025/2026

C836 - Fundamentals of Information Security (WGU) EXAM QUESTIONS WITH CORRECT ANSWERS||100%GUARANTEE D PASS||A+ GRADED!!||UPDATED 2025/2026||&lt;LATEST VERSION&gt;| What are the five different models of Access Control? - ANSWER Discretionary, Mandatory, Rule-based, Role-based, and Attribute based Discretionary Access Control (DAC) - ANSWER owner of resources determines who gets access and what level. Most operating systems use this. If we decide to create a network share, for instance, we get to decide who we want to allow access. Mandatory Access Control - ANSWER separate group or individual (from owner) has the authority to set access to resources. We can often find MAC implemented in government organizations, where access to a given resource is largely dictated by the sensitivity label applied to it (secret, top secret, etc.), by the level of sensitive information the individual is allowed to access (perhaps only secret), and by whether the individual actually has a need to access the resource Rule-based Access Control (RuBAC) - ANSWER allows access according to a set of rules defined by the system administrator. Example Firewalls and Routers. Attribute-based access control (ABAC) - ANSWER This is an access control paradigm whereby access rights are granted to users with policies that combine attributes together. Subject, resource, environmental, physical Bell-LaPadula model - ANSWER implements a combination of DAC and MAC and is primarily concerned with the confidentiality of the resource in question. Generally, in cases where we see DAC and MAC implemented together, MAC takes precedence over DAC, and DAC works within the accesses allowed by the MAC permissions. Simple Security Property - ANSWER The level of access granted to an individual must be at least as high as the classification of the resource in order for the individual to be able to access it. The * property - ANSWER Anyone accessing a resource can only write its contents to one classified at the same level or higher. No read up, no write down - ANSWER means that when we are handling classified information, we cannot read any higher than our clearance level, and we cannot write classified data down to any lower level. Biba Model - ANSWER An access control model used to ensure integrity. It uses two primary rules: no read down and no write up. Simple integrity axiom - ANSWER The level of access granted to an individual must be no lower than the classification of the resource. *Integrity axiom - ANSWER Anyone accessing a resource can only write its contents to one classified at the same level or lower. No read down, no write up - ANSWER entails that assets that are of high integrity and assets that are of low integrity are kept strictly apart Brewer and Nash Model - ANSWER also known as the Chinese Wall model, is an access control model designed to prevent conflicts of interest. Example of Brewer and Nash Model - ANSWER A commercial law firm working for companies in a certain industry might have files that pertain to various individuals and companies working in that industry. As an individual lawyer at the firm accesses data and works for different clients, he could potentially access confidential data that would generate a conflict of interest while working on a new case. In the Brewer and Nash model, the resources and case materials that the lawyer was allowed access to would dynamically change based on the materials he had previously accessed. Physical access controls - ANSWER concerned with controlling the movement of individuals and vehicles Accountability - ANSWER refers to making sure that a person is responsible for their actions. It provides us with the means to trace activities in our environment back to their source. Accountability depends on - ANSWER identification, authentication, and access control being present so that we can know who a given transaction is associated with, and what permissions were used to allow them to carry it out. Auditing - ANSWER the methodical examination and review of an organization's records Examples of things that are audited: - ANSWER i. Factors that determine access to systems ii. Software licenses iii. Internet usage iv. passwords An audit is a kind of - ANSWER assessment Cryptography - ANSWER the science of protecting confidentiality and integrity of data Encryption - ANSWER is the process of transforming plaintext into ciphertext Decryption - ANSWER is encryption in reverse

Mostrar más Leer menos
Institución
C836 - Fundamentals Of Information Security
Grado
C836 - Fundamentals of Information Security










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
C836 - Fundamentals of Information Security
Grado
C836 - Fundamentals of Information Security

Información del documento

Subido en
21 de noviembre de 2025
Número de páginas
29
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

C836 - Fundamentals of
Information Security (WGU)
EXAM QUESTIONS WITH
CORRECT
ANSWERS||100%GUARANTEE
D PASS||A+
GRADED!!||UPDATED
2025/2026||<LATEST
VERSION>|
What are the five different models of Access Control? - ANSWER ✓
Discretionary, Mandatory, Rule-based, Role-based, and Attribute based

Discretionary Access Control (DAC) - ANSWER ✓ owner of resources
determines who gets access and what level. Most operating systems use this. If we
decide to create a network share, for instance, we get to decide who we want to
allow access.

Mandatory Access Control - ANSWER ✓ separate group or individual (from
owner) has the authority to set access to resources. We can often find MAC
implemented in government organizations, where access to a given resource is
largely dictated by the sensitivity label applied to it (secret, top secret, etc.), by the
level of sensitive information the individual is allowed to access (perhaps only
secret), and by whether the individual actually has a need to access the resource

Rule-based Access Control (RuBAC) - ANSWER ✓ allows access according to a
set of rules defined by the system administrator. Example Firewalls and Routers.

, Attribute-based access control (ABAC) - ANSWER ✓ This is an access control
paradigm whereby access rights are granted to users with policies that combine
attributes together. Subject, resource, environmental, physical

Bell-LaPadula model - ANSWER ✓ implements a combination of DAC and MAC
and is primarily concerned with the confidentiality of the resource in question.
Generally, in cases where we see DAC and MAC implemented together, MAC
takes precedence over DAC, and DAC works within the accesses allowed by the
MAC permissions.

Simple Security Property - ANSWER ✓ The level of access granted to an
individual must be at least as high as the classification of the resource in order for
the individual to be able to access it.

The * property - ANSWER ✓ Anyone accessing a resource can only write its
contents to one classified at the same level or higher.

No read up, no write down - ANSWER ✓ means that when we are handling
classified information, we cannot read any higher than our clearance level, and we
cannot write classified data down to any lower level.

Biba Model - ANSWER ✓ An access control model used to ensure integrity. It
uses two primary rules: no read down and no write up.

Simple integrity axiom - ANSWER ✓ The level of access granted to an individual
must be no lower than the classification of the resource.

*Integrity axiom - ANSWER ✓ Anyone accessing a resource can only write its
contents to one classified at the same level or lower.

No read down, no write up - ANSWER ✓ entails that assets that are of high
integrity and assets that are of low integrity are kept strictly apart

Brewer and Nash Model - ANSWER ✓ also known as the Chinese Wall model, is
an access control model designed to prevent conflicts of interest.

Example of Brewer and Nash Model - ANSWER ✓ A commercial law firm
working for companies in a certain industry might have files that pertain to various

, individuals and companies working in that industry. As an individual lawyer at the
firm accesses data and works for different clients, he could potentially access
confidential data that would generate a conflict of interest while working on a new
case. In the Brewer and Nash model, the resources and case materials that the
lawyer was allowed access to would dynamically change based on the materials he
had previously accessed.

Physical access controls - ANSWER ✓ concerned with controlling the movement
of individuals and vehicles

Accountability - ANSWER ✓ refers to making sure that a person is responsible
for their actions. It provides us with the means to trace activities in our
environment back to their source.

Accountability depends on - ANSWER ✓ identification, authentication, and
access control being present so that we can know who a given transaction is
associated with, and what permissions were used to allow them to carry it out.

Auditing - ANSWER ✓ the methodical examination and review of an
organization's records

Examples of things that are audited: - ANSWER ✓ i. Factors that determine
access to systems
ii. Software licenses
iii. Internet usage
iv. passwords

An audit is a kind of - ANSWER ✓ assessment

Cryptography - ANSWER ✓ the science of protecting confidentiality and integrity
of data

Encryption - ANSWER ✓ is the process of transforming plaintext into ciphertext

Decryption - ANSWER ✓ is encryption in reverse

Encryption is done - ANSWER ✓ by doing a cryptographic algorithm
$15.09
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
SmartscoreAaron Chicago State University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
41
Miembro desde
1 año
Número de seguidores
3
Documentos
3245
Última venta
1 día hace
SMARTSCORES LIBRARY

Get top-tier academic support for Psychology, Nursing, Business, Engineering, HRM, Math, and more. Our team of professional tutors delivers high-quality homework, quiz, and exam assistance—ensuring scholarly excellence and grade-boosting results. Trust our collaborative expertise to help you succeed in any course at U.S.A Institutions.

3.8

4 reseñas

5
2
4
1
3
0
2
0
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes