Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C191: Operating Systems for Programmers. Exam 2025 Questions and Answers

Rating
-
Sold
-
Pages
31
Grade
A+
Uploaded on
22-05-2025
Written in
2024/2025

WGU C191: Operating Systems for Programmers. Exam 2025 Questions and Answers Secure - ANS Protects the integrity of a system. A system whose resources are used and accessed as intended under all circumstances. Cracker - ANS Someone attempting to breach security. Threat - ANS The potential for a security violation. Attack - ANS An attempt to break security. Denial-of-Service (DoS) - ANS An attack that attempts to disrupt or prevent legitimate use of a system. Trojan Horse - ANS A code segment that tries to misuse its environment. Virus - ANS A malicious fragment of code embedded in a legitimate program. Worm - ANS Similar to a virus, but self replicates throughout a network. Pg. 2 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED. Domain - ANS Specifies resources a process may access. Specifies a set of objects and the operations that may be invoked on those objects. Set of access rights. Protection - ANS A mechanism for controlling the access of programs, processes, or users to the resources defined by a computer system. Security - ANS Requires not only an adequate protection of system, but also consideration of the external environment within which the system operates (i.e., threats and attacks). Breach of Confidentiality - ANS Gaining access to information, credit card numbers, personal information, etc. Breach of Integrity - ANS Modified data. Breach of Availability - ANS Destruction of data. Theft of Service - ANS Unauthorized use of resources such as using a server as a personal file server. Trap Door - ANS A hole purposely left in a software program that only the programmer is capable of using. UNIX Domain Association - ANS A UNIX domain is associated with a user. Masquerading - ANS The most common method used by an attacker. Principle of Least Privilege - ANS Where just enough privilege is given to perform a task. Pg. 3 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED. Need-to-Know Principle - ANS Where a process is only given access to resources it currently needs. Copy and Owner Rights - ANS Rights needed to change entries in a column of an access matrix. Control Rights - ANS Rights needed to change entries in a row of an access matrix. Role-Based Access Control - ANS A type of control where privileges and programs are assigned roles, and users are assigned roles based on passwords. Compiler-Based Enforcement - ANS A type of enforcement where protection needs are declared rather than programmed. Kernel-Based Enforcement - ANS Enforcement provided by the subsystem designer. The 4 Levels of Security - ANS Physical - site must be secured. Human - only appropriate users have access. OS - system must be able to protect itself. Network - network must be secured. Logic Bomb - ANS A security incident initiated when certain logical conditions are met. Stack and Buffer Overflow - ANS A tactic used to gain access to a system by writing into the stack so that a return addr

Show more Read less
Institution
WGU C191
Course
WGU C191

Content preview

WGU C191: Operating Systems for
Programmers. Exam 2025 Questions and
Answers




Secure - ANS Protects the integrity of a system. A system whose resources are used and
accessed as intended under all circumstances.



Cracker - ANS Someone attempting to breach security.



Threat - ANS The potential for a security violation.



Attack - ANS An attempt to break security.



Denial-of-Service (DoS) - ANS An attack that attempts to disrupt or prevent legitimate use of
a system.



Trojan Horse - ANS A code segment that tries to misuse its environment.



Virus - ANS A malicious fragment of code embedded in a legitimate program.



Worm - ANS Similar to a virus, but self replicates throughout a network.



Pg. 1 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.

,Domain - ANS Specifies resources a process may access. Specifies a set of objects and the
operations that may be invoked on those objects. Set of access rights.



Protection - ANS A mechanism for controlling the access of programs, processes, or users to
the resources defined by a computer system.



Security - ANS Requires not only an adequate protection of system, but also consideration of
the external environment within which the system operates (i.e., threats and attacks).



Breach of Confidentiality - ANS Gaining access to information, credit card numbers, personal
information, etc.



Breach of Integrity - ANS Modified data.



Breach of Availability - ANS Destruction of data.



Theft of Service - ANS Unauthorized use of resources such as using a server as a personal file
server.



Trap Door - ANS A hole purposely left in a software program that only the programmer is
capable of using.



UNIX Domain Association - ANS A UNIX domain is associated with a user.



Masquerading - ANS The most common method used by an attacker.



Principle of Least Privilege - ANS Where just enough privilege is given to perform a task.



Pg. 2 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.

,Need-to-Know Principle - ANS Where a process is only given access to resources it currently
needs.



Copy and Owner Rights - ANS Rights needed to change entries in a column of an access
matrix.



Control Rights - ANS Rights needed to change entries in a row of an access matrix.



Role-Based Access Control - ANS A type of control where privileges and programs are
assigned roles, and users are assigned roles based on passwords.



Compiler-Based Enforcement - ANS A type of enforcement where protection needs are
declared rather than programmed.



Kernel-Based Enforcement - ANS Enforcement provided by the subsystem designer.



The 4 Levels of Security - ANS Physical - site must be secured.
Human - only appropriate users have access.
OS - system must be able to protect itself.
Network - network must be secured.



Logic Bomb - ANS A security incident initiated when certain logical conditions are met.



Stack and Buffer Overflow - ANS A tactic used to gain access to a system by writing into the
stack so that a return address will specify malicious code to be run.




Pg. 3 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.

, Symmetric Encryption - ANS A type of encryption where the same key is used to encrypt and
decrypt.



Asymmetric Encryption - ANS A type of encryption where 2 different keys are used to
encrypt and decrypt.



Encryption - ANS Places constraints on the receivers.



Authentication - ANS Places constraints on the senders.



SSL - ANS Allows two computers to communicate securely.



Passwords - ANS The most common authentication mechanism.



Digital Certificate - ANS A public key that has been digitally signed by a certificate authority.



Paired Passwords - ANS One is provided by the system and the other is provided by the user.



Two-Factor Authentication - ANS Authentication using something you know and something
you have.



Intrusion Detection System (IDS) - ANS Detects attempted or successful intrusions into a
system or network.



Intrusion Prevention System (IPS) - ANS Detects and attempts to prevent an intrusion into a
system or network.



Port - ANS A connection point via which an OS communicates with a device.


Pg. 4 Copyright © 2025 Jasonmcconell. ALL RIGHTS RESERVED.

Written for

Institution
WGU C191
Course
WGU C191

Document information

Uploaded on
May 22, 2025
Number of pages
31
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$13.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StarGuide Liberty University
Follow You need to be logged in order to follow users or courses
Sold
21
Member since
1 year
Number of followers
0
Documents
2588
Last sold
5 days ago
FIRST CLASS GALORE

Accurate Exam Study Materials.Verified And Updated By Professionals.

4.3

4 reviews

5
1
4
3
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions