Cybersecurity Architecture and
Engineering
Which Orange Book level is considered mandatory protections and is based on the Bell-
LaPadula security model?
AA
BC
CD
D B - CORRECT ANSWERS D
During an XOR operation, two bits are combined. Both values are the same.
What will be the result of this combination?
A1
B0
C OR
D X - CORRECT ANSWERS B
Which section of the Minimum Security Requirements for Multi-User Operating System
(NISTIR 5153) document addresses end-to-end user accountability?
A access control
B audit
C data integrity
D system integrity - CORRECT ANSWERS B
Which encryption algorithm is based on the Diffie-Hellman key agreement?
A Knapsack
B International Data Encryption Algorithm
C El Gamal
D HAVAL - CORRECT ANSWERS C
What is meant by the term fail-safe?
A system's ability to switch over to a backup system in the event of a failure
B system's ability to preserve a secure state before and after failure
C system's ability to recover automatically through a reboot
D system's ability to terminate processes when a failure is identified - CORRECT
ANSWERS D
You need to store some magnetic storage devices in a temporary storage facility.
,WGU Master's Course C726 -
Cybersecurity Architecture and
Engineering
At which temperature could damage start to occur?
A 350 degrees Fahrenheit
B 100 degrees Fahrenheit
C 90 degrees Fahrenheit
D 175 degrees Fahrenheit - CORRECT ANSWERS B
You need to decrypt a file that is encrypted using asymmetric encryption.
What should be used to decrypt the file?
A public key
B plaintext
C message digest
D private key - CORRECT ANSWERS D
Which statement is true of the Rijndael algorithm?
A Rijndael uses variable block lengths and variable key lengths.
B Rijndael uses fixed block lengths and fixed key lengths.
C Rijndael uses variable block lengths and fixed key lengths.
D Rijndael uses fixed block lengths and variable key lengths. - CORRECT ANSWERS
A
You are responsible for managing the virtual computers on your network.
Which guideline is important when managing virtual computers?
A Update the operating system and applications only on the host computer.
B Implement a firewall only on the host computer.
C Install and update the antivirus program only on the host computer.
D Isolate the host computer and each virtual computer from each other. - CORRECT
ANSWERS D
Given two messages, M1 and M2, what is the LEAST likely outcome when using the
same one-way hash function, H, to encrypt the messages?
A H(M1) = H(M2)
B H(M1) is not equal to H(M2)
C H(M1) > H(M2)
D H(M1) < H(M2) - CORRECT ANSWERS A
, WGU Master's Course C726 -
Cybersecurity Architecture and
Engineering
Your organization has decided to implement the Diffie-Hellman asymmetric algorithm.
Which statement is true of this algorithm's key exchange?
A Authorized users exchange public keys over a secure medium.
B Unauthorized users exchange public keys over a nonsecure medium.
C Authorized users exchange secret keys over a nonsecure medium.
D Authorized users need not exchange secret keys. - CORRECT ANSWERS C
Which processes control the flow of information in the lattice-based access control
(LBAC) model?
A access triple rule
B least upper and greatest lower bound operators
C simple security, star property, and strong star property rules
D star (*) integrity and simple integrity axioms - CORRECT ANSWERS B
Management at your organization has recently become aware that the Internet of
Things (IoT) movement has resulted in many security issues. They have asked that you
identify some of the vulnerabilities presented by IoT from the following list:
A insecure management Web interface
B insufficient or lack of authentication
C lack of transport encryption
D insecure software/firmware
E insufficient or lack of physical security
F All of the above
Which would apply? - CORRECT ANSWERS F
What is the best description of an execution domain?
A memory space insulated from other running processes in a multiprocessing system
B a communication channel between an application and the kernel in the TCB
C components that fall outside the security perimeter of the TCB
D an isolated area that is used by trusted processes when they are run in privileged
state - CORRECT ANSWERS D
Which characteristics of a system are evaluated by the Trusted Computer System
Evaluation Criteria (TCSEC)? (Choose TWO):
A assurance