Computer Science  >  EXAMs  >  WGU, Information Security and Assurance (C725), SET III (All)

WGU, Information Security and Assurance (C725), SET III

Document Content and Description Below

A job title: Have access to information resources in accordance with the owner-defined controls and access rules. Correct Answer: Users One purpose of a security awareness program is to modify whi ... ch of the following? A. Employees' attitudes and behaviors B. Management's approach C. Attitudes of employees toward sensitive data D. Corporate attitudes about safeguarding data Correct Answer: A. Employees' attitudes and behaviors Explanation: Because people are the weakest link in any security-related process, it's crucial that a security program address user education, awareness, and training on policies and procedures that affect them. The totality of protection mechanisms within a computer system, including hardware, firmware, and software. It consists of one or more components that together enforce a unified security policy over a product or system Correct Answer: Trusted Computing Base (TCB) A software model that mediates all access from any subject (user or other device) to any object (resource, data, and so forth); it cannot be bypassed.It mediates accesses to objects by subjects. In principle, it should be: Complete, to mediate every access Isolated from modification by other system entities (objects and processes) Verifiable, doing only what it's programmed to do and not being susceptible to circumvention by malicious acts or programmer error Correct Answer: reference monitor a.k.a. abstract machine Implementation of a reference monitor for a specific hardware base, such as Sun Solaris, Red Hat Linux, or Mac OS X. Correct Answer: security kernel The TCB, reference monitor, and security kernel are essential for military- and government-grade information technology (IT) security to prevent unauthorized access or threats to the integrity of programs, operating systems, or data. T or F [Show More]

Last updated: 3 years ago

Preview 1 out of 14 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of WGU, Information Security and Assurance (C725), SET III document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Reviews( 0 )

$8.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

146
0

Document information


Connected school, study & course


About the document


Uploaded On

Nov 12, 2022

Number of pages

14

Written in

All

Seller


Profile illustration for Crum
Crum

Member since 3 years

64 Documents Sold

Reviews Received
10
1
1
0
1
Additional information

This document has been written for:

Uploaded

Nov 12, 2022

Downloads

 0

Views

 146

Document Keyword Tags

Recommended For You

Get more on EXAMs »

$8.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·