WGU C795 Cybersecurity Management II Tactical SOBs
Exam (elaborations)
WGU C795 Cybersecurity Management II Tactical SOBs Questions and Answers (2022/2023) (Verified Answers)
11 views 0 purchase
Module
WGU C795 Cybersecurity Management II Tactical SOBs
Institution
Western Governors University
WGU C795 Cybersecurity Management II Tactical SOBs Questions and Answers (2022/2023) (Verified Answers)
____________ subjects are granted only the privileges necessary to perform assigned work tasks and no more. Keep in mind that privilege in this context includes both permissions to data and ri...
wgu c795 cybersecurity management ii tactical sobs questions and answers 20222023 verified answers subjects are granted only the privileges necessary to perform assigned work tasks
Written for
Western Governors University
WGU C795 Cybersecurity Management II Tactical SOBs
All documents for this subject (1)
Seller
Follow
ACADEMICAIDSTORE
Reviews received
Content preview
WGU C795 Cybersecurity Management II Tactical SOBs
Questions and Answers (2022/2023) (Verified Answers)
____________ subjects are granted only the privileges necessary to perform assigned
work tasks and no more. Keep in mind that privilege in this context includes both
permissions to data and rights to perform tasks on systems.
The principle of least privilege states that
____________ ensures that no single person has total control over a critical function or
system. This is necessary to ensure that no single person can compromise the system
or its security.
Separation of duties and responsibilities
___________is similar in concept to separation of duties and responsibilities. A
separation-of-privilege policy requires the use of granular rights and permissions.
Separation of privilege
____________ is known as management of changes made to the system's hardware,
software, or firmware throughout its operational life cycle.
Configuration management
____________ ............ they run as guest operating systems on physical servers. The
physical servers include extra processing power, memory, and disk storage to handle
the VM requirements.
1. Virtual Machines (VMs):
__________ is sometimes called a virtual desktop environment (VDE), hosts a user's
desktop as a VM on a server. Users can connect to the server to access their desktop
from almost any system, including from mobile devices. Persistent virtual desktops
retain a custom desktop for the user. Nonpersistent virtual desktops are identical for all
users. If a user makes changes, the desktop reverts to a known state after the user logs
off.
1. Virtual Desktop Infrastructure (VDI):
_____________.....they decouple the control plane from the data plane (or forwarding
plane). The control plane uses protocols to decide where to send traffic, and the data
plane includes rules that decide whether traffic will be forwarded. Instead of traditional
networking equipment such as routers and switches, an SDN controller handles traffic
routing using simpler network devices that accept instructions from the controller. This
eliminates some of the complexity related to traditional networking protocols.
1. Software-Defined Networks (SDNs):
_____________A SAN is a dedicated high-speed network that hosts multiple storage
devices. They are often used with servers that need high-speed access to data. These
have historically been expensive due to the complex hardware requirements of the
SAN. VSANs bypass these complexities with virtualization.
1. Virtual Storage Area Networks (VSANs):
________________ models provide fully functional applications typically accessible via
a web browser. For example, Google's Gmail is a SaaS application. The CSP (Google
in this example) is responsible for all maintenance of the SaaS services. Consumers do
not manage or control any of the cloud-based assets.
, 1. Software as a service (SaaS): Software as a service (SaaS)
________________ models provide consumers with a computing platform, including
hardware, an operating system, and applications. In some cases, consumers install the
applications from a list of choices provided by the CSP. Consumers manage their
applications and possibly some configuration settings on the host. However, the CSP is
responsible for maintenance of the host and the underlying cloud infrastructure.
1. Platform as a service (PaaS): Platform as a service (PaaS)
______________ models provide basic computing resources to consumers. This
includes servers, storage, and in some cases, networking resources. Consumers install
operating systems and applications and perform all required maintenance on the
operating systems and applications. The CSP maintains the cloud-based infrastructure,
ensuring that consumers have access to leased systems. The distinction between IaaS
and PaaS models isn't always clear when evaluating public services. However, when
leasing cloud-based services, the label the CSP uses isn't as important as clearly
understanding who is responsible for performing different maintenance and security
actions.
1. Infrastructure as a service (IaaS): Infrastructure as a service (IaaS)
___________ includes assets available for any consumers to rent or lease and is
hosted by an external CSP. Service-level agreements can be effective at ensuring that
the CSP provides the cloud-based services at a level acceptable to the organization.
1. A public cloud model
______________ is used for cloud-based assets for a single organization.
Organizations can create and host private clouds using their own on-premises
resources. If so, the organization is responsible for all maintenance. However, an
organization can also rent resources from a third party for exclusive use of the
organization. Maintenance requirements are typically split based on the service model
(SaaS, PaaS, or IaaS).
1. The private cloud deployment model
_______________provides cloud-based assets to two or more organizations. Assets
can be owned and managed by one or more of the organizations. Maintenance
responsibilities are shared based on who is hosting the assets and the service models.
1. A community cloud deployment model
_____________ includes a combination of two or more clouds. Similar to a community
cloud model, maintenance responsibilities are shared based on who is hosting the
assets and the service models in use
1. A hybrid cloud model
Organizations apply ______________ to ensure that resources are securely
provisioned and managed. As an example, desktop computers are often deployed using
imaging techniques to ensure that they start in a known secure state
various resource protection techniques
_______________ ensure that the systems are kept up-to-date with required changes.
The techniques vary depending on the resource and are described in the following
sections.
Change management and patch management techniques
____________ helps verify that systems are not vulnerable to known threats.
vulnerability management
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller ACADEMICAIDSTORE. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £9.00. You're not tied to anything after your purchase.