TestOut SecurityPro (8.2-8.5)

TestOut SecurityPro (8.2-8.5)

University

19 Qs

quiz-placeholder

Similar activities

Vulnerability Research and Tools

Vulnerability Research and Tools

University

15 Qs

WNS Revision

WNS Revision

University

20 Qs

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

035_Cloud-specific Vulnerabilities – CompTIA Security+ –

035_Cloud-specific Vulnerabilities – CompTIA Security+ –

9th Grade - University

20 Qs

cyber awareness

cyber awareness

University

20 Qs

AACS3013 Quick Revision C1-C3

AACS3013 Quick Revision C1-C3

University

20 Qs

Windows Active Directory

Windows Active Directory

University - Professional Development

19 Qs

Itec285 End of Year

Itec285 End of Year

University

17 Qs

TestOut SecurityPro (8.2-8.5)

TestOut SecurityPro (8.2-8.5)

Assessment

Quiz

Computers

University

Hard

Created by

James Stephens

Used 8+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following information is typically not included in an access token?

User security identifier

Group memebership

User rights

User account password

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following terms describes the component that is generated following authentication and is used to gain access to resources following login?

Proxy

Access token

Account policy

Cookie

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder.

Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Manager's group.

What should you do? (8.3)

Add his user account to the ACL for the shared folder

Have Marcus log off and log back in

Manually refresh Group Policy settings on his computer

Manually refresh Group Policy settings on the file server

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(8.3) Which security mechanism uses a unique list that meets the following specifications?

  • The list is embedded directly in the object itself
  • The list defines which subjects have access to certain objects
  • The list specifies the level or type of access allowed to certain objects

Hasing

Kerberos

User ACL

Mandatory access control

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(8.4) You want to prevent your browser from running JavaScript commands that are potentially harmful. Which of the following would you restrict to accomplish this?

ActiveX

Server-side scripts

CGI

Client-side scripts

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(8.4) A programmer that fails to check the length of input before processing leaves their code vulnerable to what form of common attack?

Privilege escalation

Session hijacking

Buffer overflow

Backdoor

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(8.4) Which of the following is an attack that injects malicious scripts into web pages to redirect users to fake websites or gather personal information?

Drive-by download

SQL injection

XSS

DLL injection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?