WGU Information Security And Assurance (C725) SET
III: Questions & Solutions
A job title: Have access to information resources in accordance with the
owner-defined controls and access rules. Right Ans - Users
One purpose of a security awareness program is to modify which of the
following?
A. Employees' attitudes and behaviors
B. Management's approach
C. Attitudes of employees toward sensitive data
D. Corporate attitudes about safeguarding data Right Ans - A. Employees'
attitudes and behaviors
Explanation:
Because people are the weakest link in any security-related process, it's
crucial that a security program address user education, awareness, and
training on policies and procedures that affect them.
The totality of protection mechanisms within a computer system, including
hardware, firmware, and software. It consists of one or more components that
together enforce a unified security policy over a product or system Right
Ans - Trusted Computing Base (TCB)
A software model that mediates all access from any subject (user or other
device) to any object (resource, data, and so forth);
it cannot be bypassed.It mediates accesses to objects by subjects. In principle,
it should be:
Complete, to mediate every access
Isolated from modification by other system entities (objects and processes)
,Verifiable, doing only what it's programmed to do and not being susceptible to
circumvention by malicious acts or programmer error Right Ans -
reference monitor
a.k.a. abstract machine
Implementation of a reference monitor for a specific hardware base, such as
Sun Solaris, Red Hat Linux, or Mac OS X. Right Ans - security kernel
The TCB, reference monitor, and security kernel are essential for military- and
government-grade information technology (IT) security to prevent
unauthorized access or threats to the integrity of programs, operating
systems, or data.
T or F
In "The ring of trust" Trust in a system moves from the outside to the inside in
a unidirectional mode. Right Ans - True
T or F
Multics was the first operating system to provide a hierarchical file system
Right Ans - True
Which of the following terms best defines the sum of protection mechanisms
inside the computer, including hardware, firmware, and software?
A . Trusted system
B .Security kernel
C. Trusted computing base
D. Security perimeter Right Ans - C. Trusted computing base
Explanation:
The Trusted Computing Base (TCB) is the totality of protection mechanisms
within a computer system, including hardware, firmware, and software.
A TCB practice in which a design objective in which each process has its own
distinct address space for its application code and data. Such a design makes it
, possible to prevent each process from accessing another process's data. This
prevents data or information leakage and prevents modification of the data
while in memory. Right Ans - Process isolation
A TCB practice in which a process (program) have no more privilege than
what it really needs to perform its functions. Any modules that require
supervisor or root access (that is, complete system privileges) are embedded
in the operating system kernel. The kernel handles all requests for system
resources and mediates the access from external modules to privileged
modules when required. Right Ans - The principle of least privilege
A TCB practice in which specifically relates to the segmentation of memory
into protected segments. The kernel allocates the required amount of memory
for the process to load its application code, its process data, and its application
data. The system prevents user processes from accessing another process's
allocated memory. It also prevents user processes from accessing system
memory. Right Ans - Hardware segmentation
A TCB practice in which process operation that is divided into layers by
function. Each layer deals with a specific activity. The lower (outer) layers
perform basic tasks, whereas the higher (inner) layers perform more complex
or protected tasks. Right Ans - Layering
A TCB practice in which a process that defines a specific set of permissible
values for an object and the operations that are permissible on that object.
This involves ignoring or separating implementation details to concentrate on
what is important to maintain security. Right Ans - Abstraction
A TCB practice in which a mechanism used to ensure that information
available at one processing level is not available in another, regardless of
whether it is higher or lower. It is also a concept in the object-oriented
programming (OOP) technique when information is encapsulated within an
object and can be directly manipulated only by the services provided within
the object. Right Ans - Data hiding
a.k.a. information hiding
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Zendaya. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for R280,97. You're not tied to anything after your purchase.