Computer Architecture > EXAM > WGU Master's Course C726 - Cybersecurity Architecture and Engineering (All)

WGU Master's Course C726 - Cybersecurity Architecture and Engineering

Document Content and Description Below

WGU Master's Course C726 - Cybersecurity Architecture and Engineering Which Orange Book level is considered mandatory protections and is based on the BellLaPadula security model? A A B C C D D ... B - ✔✔D During an XOR operation, two bits are combined. Both values are the same. What will be the result of this combination? A 1 B 0 C OR D X - ✔✔B Which section of the Minimum Security Requirements for Multi-User Operating System (NISTIR 5153) document addresses end-to-end user accountability? A access control B audit C data integrity D system integrity - ✔✔B Which encryption algorithm is based on the Diffie-Hellman key agreement? A Knapsack B International Data Encryption Algorithm C El Gamal D HAVAL - ✔✔C What is meant by the term fail-safe? A system's ability to switch over to a backup system in the event of a failure B system's ability to preserve a secure state before and after failure C system's ability to recover automatically through a reboot D system's ability to terminate processes when a failure is identified - ✔✔DYou need to store some magnetic storage devices in a temporary storage facility. At which temperature could damage start to occur? A 350 degrees Fahrenheit B 100 degrees Fahrenheit C 90 degrees Fahrenheit D 175 degrees Fahrenheit - ✔✔B You need to decrypt a file that is encrypted using asymmetric encryption. What should be used to decrypt the file? A public key B plaintext C message digest D private key - ✔✔D Which statement is true of the Rijndael algorithm? A Rijndael uses variable block lengths and variable key lengths. B Rijndael uses fixed block lengths and fixed key lengths. C Rijndael uses variable block lengths and fixed key lengths. D Rijndael uses fixed block lengths and variable key lengths. - ✔✔A You are responsible for managing the virtual computers on your network. Which guideline is important when managing virtual computers? A Update the operating system and applications only on the host computer. B Implement a firewall only on the host computer. C Install and update the antivirus program only on the host computer. D Isolate the host computer and each virtual computer from each other. - ✔✔D Given two messages, M1 and M2, what is the LEAST likely outcome when using the same one-way hash function, H, to encrypt the messages? A H(M1) = H(M2) B H(M1) is not equal to H(M2) C H(M1) > H(M2) D H(M1) < H(M2) - ✔✔A Your organization has decided to implement the Diffie-Hellman asymmetric algorithm. Which statement is true of this algorithm's key exchange?A Authorized users exchange public keys over a secure medium. B Unauthorized users exchange public keys over a nonsecure medium. C Authorized users exchange secret keys over a nonsecure medium. D Authorized users need not exchange secret keys. - ✔✔C [Show More]

Last updated: 2 years ago

Preview 1 out of 17 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$11.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

188
0

Document information


Connected school, study & course


About the document


Uploaded On

Jul 09, 2022

Number of pages

17

Written in

Seller


seller-icon
Prof.Pierro

Member since 4 years

255 Documents Sold

Reviews Received
31
7
3
0
0
Additional information

This document has been written for:

Uploaded

Jul 09, 2022

Downloads

 0

Views

 188

Document Keyword Tags

Recommended For You

Get more on EXAM »

$11.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·