100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU Master's Course C726 - Cybersecurity Architecture and Engineering Questions And Answers( Complete Solution Rated A) $14.99   Add to cart

Exam (elaborations)

WGU Master's Course C726 - Cybersecurity Architecture and Engineering Questions And Answers( Complete Solution Rated A)

 5 views  0 purchase
  • Course
  • Institution

WGU Master's Course C726 - Cybersecurity Architecture and Engineering Questions And Answers( Complete Solution Rated A)

Preview 3 out of 17  pages

  • June 18, 2022
  • 17
  • 2021/2022
  • Exam (elaborations)
  • Questions & answers
avatar-seller
WGU Master's Course C726 -
Cybersecurity Architecture and
Engineering
Which Orange Book level is considered mandatory protections and is based on the Bell-
LaPadula security model?

AA
BC
CD
DB-D

During an XOR operation, two bits are combined. Both values are the same.

What will be the result of this combination?

A1
B0
C OR
DX-B

Which section of the Minimum Security Requirements for Multi-User Operating System
(NISTIR 5153) document addresses end-to-end user accountability?

A access control
B audit
C data integrity
D system integrity - B

Which encryption algorithm is based on the Diffie-Hellman key agreement?

A Knapsack
B International Data Encryption Algorithm
C El Gamal
D HAVAL - C

What is meant by the term fail-safe?

A system's ability to switch over to a backup system in the event of a failure
B system's ability to preserve a secure state before and after failure
C system's ability to recover automatically through a reboot
D system's ability to terminate processes when a failure is identified - D

,You need to store some magnetic storage devices in a temporary storage facility.

At which temperature could damage start to occur?

A 350 degrees Fahrenheit
B 100 degrees Fahrenheit
C 90 degrees Fahrenheit
D 175 degrees Fahrenheit - B

You need to decrypt a file that is encrypted using asymmetric encryption.

What should be used to decrypt the file?

A public key
B plaintext
C message digest
D private key - D

Which statement is true of the Rijndael algorithm?

A Rijndael uses variable block lengths and variable key lengths.
B Rijndael uses fixed block lengths and fixed key lengths.
C Rijndael uses variable block lengths and fixed key lengths.
D Rijndael uses fixed block lengths and variable key lengths. - A

You are responsible for managing the virtual computers on your network.

Which guideline is important when managing virtual computers?

A Update the operating system and applications only on the host computer.
B Implement a firewall only on the host computer.
C Install and update the antivirus program only on the host computer.
D Isolate the host computer and each virtual computer from each other. - D

Given two messages, M1 and M2, what is the LEAST likely outcome when using the same
one-way hash function, H, to encrypt the messages?

A H(M1) = H(M2)
B H(M1) is not equal to H(M2)
C H(M1) > H(M2)
D H(M1) < H(M2) - A

Your organization has decided to implement the Diffie-Hellman asymmetric algorithm.

Which statement is true of this algorithm's key exchange?

, A Authorized users exchange public keys over a secure medium.
B Unauthorized users exchange public keys over a nonsecure medium.
C Authorized users exchange secret keys over a nonsecure medium.
D Authorized users need not exchange secret keys. - C

Which processes control the flow of information in the lattice-based access control (LBAC)
model?

A access triple rule
B least upper and greatest lower bound operators
C simple security, star property, and strong star property rules
D star (*) integrity and simple integrity axioms - B

Management at your organization has recently become aware that the Internet of Things
(IoT) movement has resulted in many security issues. They have asked that you identify
some of the vulnerabilities presented by IoT from the following list:

A insecure management Web interface
B insufficient or lack of authentication
C lack of transport encryption
D insecure software/firmware
E insufficient or lack of physical security
F All of the above

Which would apply? - F

What is the best description of an execution domain?

A memory space insulated from other running processes in a multiprocessing system
B a communication channel between an application and the kernel in the TCB
C components that fall outside the security perimeter of the TCB
D an isolated area that is used by trusted processes when they are run in privileged state -
D

Which characteristics of a system are evaluated by the Trusted Computer System
Evaluation Criteria (TCSEC)? (Choose TWO):

A assurance
B authenticity
C functionality
D response-time - AC

Why should device driver files be digitally signed?

A to record the installation timestamp

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Succeed. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77333 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.99
  • (0)
  Add to cart