WGU C191 Module 5 Protection and Security Study guide Exam Questions with Key Marking Scheme Updated 2024/2025
10 views 0 purchase
Course
WGU C191
Institution
WGU C191
WGU C191 Module 5 Protection and Security Study guide Exam Questions with Key Marking Scheme Updated 2024/2025
A fragment of code embedded in a legitimate program - correct answer Virus
In the UNIX operating system, a domain is associated with the ____. - correct answer user
The most commo...
WGU C191 Module 5 Protection and
Security Study guide Exam Questions
with Key Marking Scheme Updated
2024/2025
A fragment of code embedded in a legitimate program - correct answer Virus
In the UNIX operating system, a domain is associated with the ____. - correct answer
user
The most common method used by attackers to breach security is ____. - correct
answer masquerading
A code segment that misuses its environment is called ____. - correct answer a Trojan
horse
In an access matrix, the ____ right allows a process to change the entries in a row. -
correct answer control
Worms ____. - correct answer use the spawn mechanism to ravage system
performance/can shut down an entire network/continue to grow as the Internet expands
A denial of service attack is ____. - correct answer aimed at disrupting legitimate use
of a system
In a paired-password system, ____. - correct answer the computer supplies one part of
a password and the user enters the other part
In the reacquisition scheme for implementing the revocation of capabilities, ____. -
correct answer capabilities are periodically deleted from each domain
,Which of the following is a true statement regarding the relative merits between access
rights enforcement based solely on a kernel, as opposed to enforcement provided
largely by a compiler? - correct answer Enforcement by the kernel is less flexible than
enforcement by the programming language for user-defined policy.
____ layer security generally has been standardized on IPSec. - correct answer
Network
Secure - correct answer Protects the integrity of a system. A system whose resources
are used and accessed as intended under all circumstances.
Cracker - correct answer Someone attempting to breach security
Threat - correct answer The potential for a security violation
Attack - correct answer The attempt to break security
DoS - correct answer An attack that attempts to disrupt or prevent legitimate use of a
system
Trojan horse - correct answer A code segment that tries to misuse its environment
Virus - correct answer A fragment of code embedded in a legitimate program
Worm - correct answer Similar to virus but self replicates through out a network
Domain - correct answer Specifies resources a process may access. Specifies a set of
objects and the operations that may be invoked on those objects. Set of access rights.
Protection - correct answer a mechanism for controlling the access of programs,
processes, or users to the resources defined by a computer system.
, Security - correct answer requires not only an adequate protection of system but also
consideration of the external environment within which the system operates ( ie , threats
and attacks).
Breach of confidentiality - correct answer Getting a hold of information, credit card
numbers etc
Breach of integrity - correct answer Modify data
Breach of availability - correct answer Destruction of data
Theft of service - correct answer Unauthorized use of resources, Example-using a
server for your own file server
Trap door - correct answer hole purposely left in software program that only the
programmer is capable of using.
In unix the domain is associated with what? - correct answer the user
What is the most common method used by an attacker? - correct answer
Masquerading
Principle where just enough privilege is given to perform a task. - correct answer
Principle of least privilege
Principle where a process is only given access to resources it currently needs. - correct
answer Need to know principle
Rights needed to change entries in a column of an access matrix - correct answer
Copy and owner rights
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller KieranKent55. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.49. You're not tied to anything after your purchase.