100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C836 Fundamentals of Information Security, Exam Questions and answers, 100% Accurate, VERIFIED.

Beoordeling
-
Verkocht
-
Pagina's
8
Cijfer
A+
Geüpload op
24-10-2023
Geschreven in
2023/2024

WGU C836 Fundamentals of Information Security, Exam Questions and answers, 100% Accurate, VERIFIED. What are the 4 basic tasks for access controls? ACL Allowing access, denying access, limiting access, and revoking access. What is a Sandbox? A set of resources devoted to a program, outside of which the entity cannot operate. This is an access control method to prevent the untested code from accessing other resources they shouldn't be. How does a linux File ACL work in terms of permissions and user groupings? There is a user, group, and other and their permissions are in that order. Each category has its own (RWX) read, write, and execute permissions. An example is drwxrw-r--. The d is the file type which in this case means directory. The user can read write and execute, the group can read and write, and other users can only read. What do Network ACLs use to allow or deny access? 3 Network ACLs will use port numbers, MAC addresses, and IP addresses to allow or deny access. Network ACLs can be used in switches, routers, firewall devices, and software firewalls. What is blackholing and what is it used for? Web and mail servers use blackholing to block out known attacks, spammers and other undesirable traffic on a large scale. This practice is commonly referred to as blackholing, because any traffic to such filtered destinations is simply dropped and appears to have vanished into a black hole from the perspective of the sender. How does capability based security allow or deny authorization? capabilities are oriented around the use of a token that controls our access. in capability-based systems, the right to access a resource is based entirely on possession of the token, and not who possesses it. What is the confused deputy problem? What authorization system is it used in and what system stops it? It is when the software has a higher authorizations than the person who is using it. They can use the authorization of the software to access resources they as a person aren't authorized to. Confused deputy is seen in ACL systems and is stopped by capability based authorization systems. What are CSRF and clickjacking/user interface redressing attacks? How can they be stopped? They are common client-side attacks. cross site request forgery places a link on a site you trust or in and e-mail and when you click that link it automatically makes a request on the site you are authenticated to. The request is seen as being made by you and could be used to transfer bank money or to buy things on amazon. Clickjacking is when an attacker modifies a site and creates an invisible layer over something a user wouldn't normally click. When they click the malicious code is executed. This kind of attacks can be prevented by NoScript for firefox and GuardedID for internet explorer. 1. Name the five Access control Methodologies/Models. 2. How is access/authorization decided for each one? 3. Give an example of what situation would each model be used in 1. Discretionary Access control DAC- based on the owner of the resource. If I made a network share I would decide who can have access. 2. Mandatory Access Control MAC- based on a group or individual who has authority to set access on resources. This is used in the military who give access based on a sensitivity label such as secret. 3. Role based access control RBAC- based on an authority individual or group but also based on the role the person being granted access is performing. This could be used for a sales person in an online retail store that would give him access to sensitive information about customer's payment information. 4. Attribute Based Access Control ABAC- based on attributes of a subject/person, resource, or environment. 5. Multilevel access control- based on more than one methodology. Used in gov and mil organizations. Bell-Lapadula is a multi-level access control model. 1. What is the primary concern for this model? 2. what are its two security properties and what do t

Meer zien Lees minder
Instelling
Vak









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
24 oktober 2023
Aantal pagina's
8
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€8,85
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
PassPoint02 Chamberlain School Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
173
Lid sinds
3 jaar
Aantal volgers
105
Documenten
4552
Laatst verkocht
4 weken geleden

4,1

39 beoordelingen

5
22
4
6
3
5
2
4
1
2

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen