100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C191 Module 5 Protection and Security Study guide Exam Questions with Key Marking Scheme Updated 2024/2025 $12.49   Add to cart

Exam (elaborations)

WGU C191 Module 5 Protection and Security Study guide Exam Questions with Key Marking Scheme Updated 2024/2025

 0 view  0 purchase
  • Course
  • WGU C191
  • Institution
  • WGU C191

WGU C191 Module 5 Protection and Security Study guide Exam Questions with Key Marking Scheme Updated 2024/2025 A fragment of code embedded in a legitimate program - correct answer Virus In the UNIX operating system, a domain is associated with the ____. - correct answer user The most commo...

[Show more]

Preview 3 out of 20  pages

  • October 16, 2024
  • 20
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU C191
  • WGU C191
avatar-seller
KieranKent55
WGU C191 Module 5 Protection and
Security Study guide Exam Questions
with Key Marking Scheme Updated
2024/2025

A fragment of code embedded in a legitimate program - correct answer Virus


In the UNIX operating system, a domain is associated with the ____. - correct answer
user


The most common method used by attackers to breach security is ____. - correct
answer masquerading


A code segment that misuses its environment is called ____. - correct answer a Trojan
horse


In an access matrix, the ____ right allows a process to change the entries in a row. -
correct answer control


Worms ____. - correct answer use the spawn mechanism to ravage system
performance/can shut down an entire network/continue to grow as the Internet expands


A denial of service attack is ____. - correct answer aimed at disrupting legitimate use
of a system


In a paired-password system, ____. - correct answer the computer supplies one part of
a password and the user enters the other part


In the reacquisition scheme for implementing the revocation of capabilities, ____. -
correct answer capabilities are periodically deleted from each domain

,Which of the following is a true statement regarding the relative merits between access
rights enforcement based solely on a kernel, as opposed to enforcement provided
largely by a compiler? - correct answer Enforcement by the kernel is less flexible than
enforcement by the programming language for user-defined policy.


____ layer security generally has been standardized on IPSec. - correct answer
Network
Secure - correct answer Protects the integrity of a system. A system whose resources
are used and accessed as intended under all circumstances.


Cracker - correct answer Someone attempting to breach security


Threat - correct answer The potential for a security violation


Attack - correct answer The attempt to break security


DoS - correct answer An attack that attempts to disrupt or prevent legitimate use of a
system


Trojan horse - correct answer A code segment that tries to misuse its environment


Virus - correct answer A fragment of code embedded in a legitimate program


Worm - correct answer Similar to virus but self replicates through out a network


Domain - correct answer Specifies resources a process may access. Specifies a set of
objects and the operations that may be invoked on those objects. Set of access rights.


Protection - correct answer a mechanism for controlling the access of programs,
processes, or users to the resources defined by a computer system.

, Security - correct answer requires not only an adequate protection of system but also
consideration of the external environment within which the system operates ( ie , threats
and attacks).


Breach of confidentiality - correct answer Getting a hold of information, credit card
numbers etc


Breach of integrity - correct answer Modify data


Breach of availability - correct answer Destruction of data


Theft of service - correct answer Unauthorized use of resources, Example-using a
server for your own file server


Trap door - correct answer hole purposely left in software program that only the
programmer is capable of using.


In unix the domain is associated with what? - correct answer the user


What is the most common method used by an attacker? - correct answer
Masquerading


Principle where just enough privilege is given to perform a task. - correct answer
Principle of least privilege


Principle where a process is only given access to resources it currently needs. - correct
answer Need to know principle


Rights needed to change entries in a column of an access matrix - correct answer
Copy and owner rights

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller KieranKent55. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79978 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.49
  • (0)
  Add to cart