Computer Architecture > EXAM > WGU Master's Course C726 - Cybersecurity Architecture and Engineering (All)
WGU Master's Course C726 - Cybersecurity Architecture and Engineering Which Orange Book level is considered mandatory protections and is based on the BellLaPadula security model? A A B C C D D ... B - ✔✔D During an XOR operation, two bits are combined. Both values are the same. What will be the result of this combination? A 1 B 0 C OR D X - ✔✔B Which section of the Minimum Security Requirements for Multi-User Operating System (NISTIR 5153) document addresses end-to-end user accountability? A access control B audit C data integrity D system integrity - ✔✔B Which encryption algorithm is based on the Diffie-Hellman key agreement? A Knapsack B International Data Encryption Algorithm C El Gamal D HAVAL - ✔✔C What is meant by the term fail-safe? A system's ability to switch over to a backup system in the event of a failure B system's ability to preserve a secure state before and after failure C system's ability to recover automatically through a reboot D system's ability to terminate processes when a failure is identified - ✔✔DYou need to store some magnetic storage devices in a temporary storage facility. At which temperature could damage start to occur? A 350 degrees Fahrenheit B 100 degrees Fahrenheit C 90 degrees Fahrenheit D 175 degrees Fahrenheit - ✔✔B You need to decrypt a file that is encrypted using asymmetric encryption. What should be used to decrypt the file? A public key B plaintext C message digest D private key - ✔✔D Which statement is true of the Rijndael algorithm? A Rijndael uses variable block lengths and variable key lengths. B Rijndael uses fixed block lengths and fixed key lengths. C Rijndael uses variable block lengths and fixed key lengths. D Rijndael uses fixed block lengths and variable key lengths. - ✔✔A You are responsible for managing the virtual computers on your network. Which guideline is important when managing virtual computers? A Update the operating system and applications only on the host computer. B Implement a firewall only on the host computer. C Install and update the antivirus program only on the host computer. D Isolate the host computer and each virtual computer from each other. - ✔✔D Given two messages, M1 and M2, what is the LEAST likely outcome when using the same one-way hash function, H, to encrypt the messages? A H(M1) = H(M2) B H(M1) is not equal to H(M2) C H(M1) > H(M2) D H(M1) < H(M2) - ✔✔A Your organization has decided to implement the Diffie-Hellman asymmetric algorithm. Which statement is true of this algorithm's key exchange?A Authorized users exchange public keys over a secure medium. B Unauthorized users exchange public keys over a nonsecure medium. C Authorized users exchange secret keys over a nonsecure medium. D Authorized users need not exchange secret keys. - ✔✔C [Show More]
Last updated: 2 years ago
Preview 1 out of 17 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Jul 09, 2022
Number of pages
17
Written in
This document has been written for:
Uploaded
Jul 09, 2022
Downloads
0
Views
188
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·