Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU Master's Course C726 - Cybersecurity Architecture and Engineering Questions And Answers( Complete Solution Rated A)

Rating
-
Sold
-
Pages
17
Grade
A+
Uploaded on
18-06-2022
Written in
2021/2022

WGU Master's Course C726 - Cybersecurity Architecture and Engineering Questions And Answers( Complete Solution Rated A)

Institution
Course

Content preview

WGU Master's Course C726 -
Cybersecurity Architecture and
Engineering
Which Orange Book level is considered mandatory protections and is based on the Bell-
LaPadula security model?

AA
BC
CD
DB-D

During an XOR operation, two bits are combined. Both values are the same.

What will be the result of this combination?

A1
B0
C OR
DX-B

Which section of the Minimum Security Requirements for Multi-User Operating System
(NISTIR 5153) document addresses end-to-end user accountability?

A access control
B audit
C data integrity
D system integrity - B

Which encryption algorithm is based on the Diffie-Hellman key agreement?

A Knapsack
B International Data Encryption Algorithm
C El Gamal
D HAVAL - C

What is meant by the term fail-safe?

A system's ability to switch over to a backup system in the event of a failure
B system's ability to preserve a secure state before and after failure
C system's ability to recover automatically through a reboot
D system's ability to terminate processes when a failure is identified - D

,You need to store some magnetic storage devices in a temporary storage facility.

At which temperature could damage start to occur?

A 350 degrees Fahrenheit
B 100 degrees Fahrenheit
C 90 degrees Fahrenheit
D 175 degrees Fahrenheit - B

You need to decrypt a file that is encrypted using asymmetric encryption.

What should be used to decrypt the file?

A public key
B plaintext
C message digest
D private key - D

Which statement is true of the Rijndael algorithm?

A Rijndael uses variable block lengths and variable key lengths.
B Rijndael uses fixed block lengths and fixed key lengths.
C Rijndael uses variable block lengths and fixed key lengths.
D Rijndael uses fixed block lengths and variable key lengths. - A

You are responsible for managing the virtual computers on your network.

Which guideline is important when managing virtual computers?

A Update the operating system and applications only on the host computer.
B Implement a firewall only on the host computer.
C Install and update the antivirus program only on the host computer.
D Isolate the host computer and each virtual computer from each other. - D

Given two messages, M1 and M2, what is the LEAST likely outcome when using the same
one-way hash function, H, to encrypt the messages?

A H(M1) = H(M2)
B H(M1) is not equal to H(M2)
C H(M1) > H(M2)
D H(M1) < H(M2) - A

Your organization has decided to implement the Diffie-Hellman asymmetric algorithm.

Which statement is true of this algorithm's key exchange?

, A Authorized users exchange public keys over a secure medium.
B Unauthorized users exchange public keys over a nonsecure medium.
C Authorized users exchange secret keys over a nonsecure medium.
D Authorized users need not exchange secret keys. - C

Which processes control the flow of information in the lattice-based access control (LBAC)
model?

A access triple rule
B least upper and greatest lower bound operators
C simple security, star property, and strong star property rules
D star (*) integrity and simple integrity axioms - B

Management at your organization has recently become aware that the Internet of Things
(IoT) movement has resulted in many security issues. They have asked that you identify
some of the vulnerabilities presented by IoT from the following list:

A insecure management Web interface
B insufficient or lack of authentication
C lack of transport encryption
D insecure software/firmware
E insufficient or lack of physical security
F All of the above

Which would apply? - F

What is the best description of an execution domain?

A memory space insulated from other running processes in a multiprocessing system
B a communication channel between an application and the kernel in the TCB
C components that fall outside the security perimeter of the TCB
D an isolated area that is used by trusted processes when they are run in privileged state -
D

Which characteristics of a system are evaluated by the Trusted Computer System
Evaluation Criteria (TCSEC)? (Choose TWO):

A assurance
B authenticity
C functionality
D response-time - AC

Why should device driver files be digitally signed?

A to record the installation timestamp

Written for

Course

Document information

Uploaded on
June 18, 2022
Number of pages
17
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$15.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Succeed Havard University
Follow You need to be logged in order to follow users or courses
Sold
1823
Member since
6 year
Number of followers
1499
Documents
5755
Last sold
5 hours ago

3.9

293 reviews

5
167
4
34
3
36
2
9
1
47

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions