100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU, Information Security and Assurance (C725), SET III UPDATED ACTUAL Exam Questions and CORRECT ANSWERS $9.49   Add to cart

Exam (elaborations)

WGU, Information Security and Assurance (C725), SET III UPDATED ACTUAL Exam Questions and CORRECT ANSWERS

 1 view  0 purchase
  • Course
  • WGU, Information Security and Assurance
  • Institution
  • WGU, Information Security And Assurance

WGU, Information Security and Assurance (C725), SET III UPDATED ACTUAL Exam Questions and CORRECT ANSWERS A job title: Have access to information resources in accordance with the owner-defined controls and access rules. - CORRECT ANSWER- Users One purpose of a security awareness program i...

[Show more]

Preview 3 out of 17  pages

  • October 14, 2024
  • 17
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU, Information Security and Assurance
  • WGU, Information Security and Assurance
avatar-seller
MGRADES
WGU, Information Security and Assurance
(C725), SET III UPDATED ACTUAL
Exam Questions and CORRECT
ANSWERS
A job title: Have access to information resources in accordance with the owner-defined
controls and access rules. - CORRECT ANSWER✔✔- Users


One purpose of a security awareness program is to modify which of the following?


A. Employees' attitudes and behaviors
B. Management's approach
C. Attitudes of employees toward sensitive data

D. Corporate attitudes about safeguarding data - CORRECT ANSWER✔✔- A. Employees'
attitudes and behaviors


Explanation:


Because people are the weakest link in any security-related process, it's crucial that a security
program address user education, awareness, and training on policies and procedures that
affect them.


The totality of protection mechanisms within a computer system, including hardware,
firmware, and software. It consists of one or more components that together enforce a unified
security policy over a product or system - CORRECT ANSWER✔✔- Trusted Computing
Base (TCB)


A software model that mediates all access from any subject (user or other device) to any
object (resource, data, and so forth);


it cannot be bypassed.It mediates accesses to objects by subjects. In principle, it should be:

,Complete, to mediate every access


Isolated from modification by other system entities (objects and processes)


Verifiable, doing only what it's programmed to do and not being susceptible to circumvention
by malicious acts or programmer error - CORRECT ANSWER✔✔- reference monitor


a.k.a. abstract machine


Implementation of a reference monitor for a specific hardware base, such as Sun Solaris, Red
Hat Linux, or Mac OS X. - CORRECT ANSWER✔✔- security kernel


The TCB, reference monitor, and security kernel are essential for military- and government-
grade information technology (IT) security to prevent unauthorized access or threats to the
integrity of programs, operating systems, or data.


T or F


In "The ring of trust" Trust in a system moves from the outside to the inside in a
unidirectional mode. - CORRECT ANSWER✔✔- True


T or F


Multics was the first operating system to provide a hierarchical file system - CORRECT
ANSWER✔✔- True


Which of the following terms best defines the sum of protection mechanisms inside the
computer, including hardware, firmware, and software?


A . Trusted system
B .Security kernel
C. Trusted computing base

, D. Security perimeter - CORRECT ANSWER✔✔- C. Trusted computing base


Explanation:


The Trusted Computing Base (TCB) is the totality of protection mechanisms within a
computer system, including hardware, firmware, and software.


A TCB practice in which a design objective in which each process has its own distinct
address space for its application code and data. Such a design makes it possible to prevent
each process from accessing another process's data. This prevents data or information leakage
and prevents modification of the data while in memory. - CORRECT ANSWER✔✔- Process
isolation


A TCB practice in which a process (program) have no more privilege than what it really
needs to perform its functions. Any modules that require supervisor or root access (that is,
complete system privileges) are embedded in the operating system kernel. The kernel handles
all requests for system resources and mediates the access from external modules to privileged
modules when required. - CORRECT ANSWER✔✔- The principle of least privilege


A TCB practice in which specifically relates to the segmentation of memory into protected
segments. The kernel allocates the required amount of memory for the process to load its
application code, its process data, and its application data. The system prevents user
processes from accessing another process's allocated memory. It also prevents user processes
from accessing system memory. - CORRECT ANSWER✔✔- Hardware segmentation


A TCB practice in which process operation that is divided into layers by function. Each layer
deals with a specific activity. The lower (outer) layers perform basic tasks, whereas the higher
(inner) layers perform more complex or protected tasks. - CORRECT ANSWER✔✔-
Layering


A TCB practice in which a process that defines a specific set of permissible values for an
object and the operations that are permissible on that object. This involves ignoring or
separating implementation details to concentrate on what is important to maintain security. -
CORRECT ANSWER✔✔- Abstraction


A TCB practice in which a mechanism used to ensure that information available at one
processing level is not available in another, regardless of whether it is higher or lower. It is

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller MGRADES. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

83637 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.49
  • (0)
  Add to cart