100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
FUNDAMENTALS OF INFORMATION SECURITY - D430 CH 3 (37 QUESTIONS AND ANSWERS). $14.99   Add to cart

Exam (elaborations)

FUNDAMENTALS OF INFORMATION SECURITY - D430 CH 3 (37 QUESTIONS AND ANSWERS).

 9 views  0 purchase
  • Course
  • WGU D430- Fundamentals of Information Security
  • Institution
  • WGU D430- Fundamentals Of Information Security

FUNDAMENTALS OF INFORMATION SECURITY - D430 CH 3 (37 QUESTIONS AND ANSWERS).

Preview 2 out of 8  pages

  • August 20, 2024
  • 8
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU D430- Fundamentals of Information Security
  • WGU D430- Fundamentals of Information Security
avatar-seller
BRAINBOOSTERS
FUNDAMENTALS OF
INFORMATION
SECURITY - D430 CH 3
(37 QUESTIONS AND
ANSWERS)
Authorization - answer process of determining
exactly what an authenticated party can do.
Typically implement authorization using access
controls


Access controls - answer tools & systems used to
deny or allow access. Can be based on physical
attributes, set of rules, lists of individuals or
systems, or other more complex factora.


sandboxes - answer isolated environments
containing a set of resources for a given purpose.
Used to prevent contents from accessing files,
memory, ad other system resources with which
they shouldnt be interacting.

, Java Virtual Machine - answer An example of
sandbox. Used to run programs written in the Java
programming language & constructed specifically
to protect users against potentially malicious
downloaded software.


Two main methods of implementing access controls
- answer - access control lists
- capabilities


Access Control Lists (ACLs) - answer lists
containing information about what kind of access
certain parties are allowed to have to a given
system.


3 permissions in ACL filing systems - answer - read
- write
- execute


Media Access Control - answer unique identifiers
hard-coded into each network interface in a given
system


IP addresses - answer unique address assigned to
each device on any network that uses the Internet
Protocol for communication. IP addresses can be
falsified & they're not unique to network interface

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller BRAINBOOSTERS. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

72042 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.99
  • (0)
  Add to cart