Information Technology > EXAM > WGU, Information Security and Assurance (C725), SET III (All)

WGU, Information Security and Assurance (C725), SET III

Document Content and Description Below

WGU, Information Security and Assurance (C725), SET III A job title: Have access to information resources in accordance with the owner-defined controls and access rules. - ✔✔Users One purpose ... of a security awareness program is to modify which of the following? A. Employees' attitudes and behaviors B. Management's approach C. Attitudes of employees toward sensitive data D. Corporate attitudes about safeguarding data - ✔✔A. Employees' attitudes and behaviors Explanation: Because people are the weakest link in any security-related process, it's crucial that a security program address user education, awareness, and training on policies and procedures that affect them. The totality of protection mechanisms within a computer system, including hardware, firmware, and software. It consists of one or more components that together enforce a unified security policy over a product or system - ✔✔Trusted Computing Base (TCB) A software model that mediates all access from any subject (user or other device) to any object (resource, data, and so forth); it cannot be bypassed.It mediates accesses to objects by subjects. In principle, it should be: Complete, to mediate every access Isolated from modification by other system entities (objects and processes) Verifiable, doing only what it's programmed to do and not being susceptible to circumvention by malicious acts or programmer error - ✔✔reference monitor a.k.a. abstract machine Implementation of a reference monitor for a specific hardware base, such as Sun Solaris, Red Hat Linux, or Mac OS X. - ✔✔security kernelThe TCB, reference monitor, and security kernel are essential for military- and government-grade information technology (IT) security to prevent unauthorized access or threats to the integrity of programs, operating systems, or data. T or F In "The ring of trust" Trust in a system moves from the outside to the inside in a unidirectional mode. - ✔✔True T or F Multics was the first operating system to provide a hierarchical file system - ✔✔True Which of the following terms best defines the sum of protection mechanisms inside the computer, including hardware, firmware, and software? A . Trusted system B .Security kernel C. Trusted computing base D. Security perimeter - ✔✔C. Trusted computing base Explanation: The Trusted Computing Base (TCB) is the totality of protection mechanisms within a computer system, including hardware, firmware, and software. A TCB practice in which a design objective in which each process has its own distinct address space for its application code and data. Such a design makes it possible to prevent each process from accessing another process's data. This prevents data or information leakage and prevents modification of the data while in memory. - ✔✔Process isolation A TCB practice in which a process (program) have no more privilege than what it really needs to perform its functions. Any modules that require supervisor or root access (that is, complete system privileges) are embedded in the operating system kernel. The kernel handles all requests for system resources and mediates the access from external modules to privileged modules when required. - ✔✔The principle of least privilege A TCB practice in which specifically relates to the segmentation of memory into protected segments. The kernel allocates the required amount of memory for the process to load its application code, its process data, and its application data. The system prevents user processes from accessing another process's allocated memory. It also prevents user processes from accessing system memory. - ✔✔Hardware segmentationA TCB practice in which process operation that is divided into layers by function. Each layer deals with a specific activity. The lower (outer) layers perform basic tasks, whereas the higher (inner) layers perform more complex or protected tasks. - ✔✔Layering A TCB practice in which a process that defines a specific set of permissible values for an object and the operations that are permissible on that object. This involves ignoring or separating implementation details to concentrate on what is important to maintain security. - ✔✔Abstraction A TCB practice in which a mechanism used to ensure that information available at one processing level is not available in another, regardless of whether it is higher or lower. It is also a concept in the object-oriented programming (OOP) technique when information is encapsulated within an object and can be directly manipulated only by the services provided within the object. - ✔✔Data hiding a.k.a. information hiding [Show More]

Last updated: 1 year ago

Preview 1 out of 14 pages

Reviews( 0 )

Recommended For You

 Engineering> EXAM > WGU, Information Security and Assurance (C725), SET I (All)

preview
WGU, Information Security and Assurance (C725), SET I

WGU, Information Security and Assurance (C725), SET I

By SUMMER , Uploaded: Aug 06, 2022

$10.5

 Management Information Systems (MIS)> EXAM > WGU Master's Course C725 - Information Security and Assurance (All)

preview
WGU Master's Course C725 - Information Security and Assurance

WGU Master's Course C725 - Information Security and Assurance Which two passwords are the weakest? A. Pa$$w0Rd%^78 B. Love@$MySon80 C. C@1Il@VEm1 D. Password1234 - ✔✔BD Which two secure methods...

By Prof.Pierro , Uploaded: Jul 09, 2022

$11

 Management Information Systems (MIS)> EXAM > WGU, Information Security and Assurance (C725), SET I (All)

preview
WGU, Information Security and Assurance (C725), SET I

WGU, Information Security and Assurance (C725), SET I Information security is primarily a discipline to manage the behavior of _____. A. Technology B. People C. Processes D. Organizations - ✔✔Pe...

By Prof.Pierro , Uploaded: Jul 09, 2022

$11

 Computer Networking> EXAM > WGU, Information Security and Assurance (C725), SET II (All)

preview
WGU, Information Security and Assurance (C725), SET II

WGU, Information Security and Assurance (C725), SET II After determining the potential attack concepts, the next step in threat modeling is to perform ______________ analysis. ______________ analys...

By Prof.Pierro , Uploaded: Jul 09, 2022

$11

 Computer Science> EXAM > Information Security and Assurance - C725 (All)

preview
Information Security and Assurance - C725

Information Security and Assurance - C725 People - - ✔✔Information security is primarily a discipline to manage the behavior of _____. A. Technology B. People C. Processes D. Organizations All...

By Prof.Pierro , Uploaded: Jul 09, 2022

$12

 *NURSING> EXAM > WGU, Information Security and Assurance (C725), SET I Questions And Answers( With Complete top Solution Rated A) (All)

preview
WGU, Information Security and Assurance (C725), SET I Questions And Answers( With Complete top Solution Rated A)

WGU, Information Security and Assurance (C725), SET I Questions And Answers( With Complete Solution Rated A)

By frankie , Uploaded: Jul 03, 2022

$10.5

 *NURSING> EXAM > WGU, Information Security and Assurance (C725), SET III Questions And Answers( With Complete top Solution Rated A) (All)

preview
WGU, Information Security and Assurance (C725), SET III Questions And Answers( With Complete top Solution Rated A)

WGU, Information Security and Assurance (C725), SET III Questions And Answers( With Complete Solution Rated A)

By frankie , Uploaded: Jul 03, 2022

$10

 *NURSING> EXAM > Information Security and Assurance - C725 Questions And Answers( With Complete top Solution Rated A) (All)

preview
Information Security and Assurance - C725 Questions And Answers( With Complete top Solution Rated A)

Information Security and Assurance - C725 Questions And Answers( With Complete Solution Rated A)

By frankie , Uploaded: Jul 03, 2022

$10.5

 *NURSING> EXAM > WGU, Information Security and Assurance (C725), SET III Questions And Answers( With Complete top Solution Rated A) (All)

preview
WGU, Information Security and Assurance (C725), SET III Questions And Answers( With Complete top Solution Rated A)

WGU, Information Security and Assurance (C725), SET III Questions And Answers( With Complete Solution Rated A)

By Jameson , Uploaded: Jun 29, 2022

$11.5

 *NURSING> EXAM > Information Security and Assurance - C725 Questions And Answers( With Complete top Solution Rated A) (All)

preview
Information Security and Assurance - C725 Questions And Answers( With Complete top Solution Rated A)

Information Security and Assurance - C725 Questions And Answers( With Complete Solution Rated A)

By Jameson , Uploaded: Jun 29, 2022

$11

$10.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
115
0

Document information


Connected school, study & course



About the document


Uploaded On

Jul 09, 2022

Number of pages

14

Written in

Seller


seller-icon
Prof.Pierro

Member since 2 years

230 Documents Sold


Additional information

This document has been written for:

Uploaded

Jul 09, 2022

Downloads

 0

Views

 115

Document Keyword Tags

THE BEST STUDY GUIDES

Avoid resits and achieve higher grades with the best study guides, textbook notes, and class notes written by your fellow students

custom preview

Avoid examination resits

Your fellow students know the appropriate material to use to deliver high quality content. With this great service and assistance from fellow students, you can become well prepared and avoid having to resits exams.

custom preview

Get the best grades

Your fellow student knows the best materials to research on and use. This guarantee you the best grades in your examination. Your fellow students use high quality materials, textbooks and notes to ensure high quality

custom preview

Earn from your notes

Get paid by selling your notes and study materials to other students. Earn alot of cash and help other students in study by providing them with appropriate and high quality study materials.


$10.00

WHAT STUDENTS SAY ABOUT US


What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·