
TestOut SecurityPro (8.2-8.5)
Authored by James Stephens
Computers
University
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following information is typically not included in an access token?
User security identifier
Group memebership
User rights
User account password
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following terms describes the component that is generated following authentication and is used to gain access to resources following login?
Proxy
Access token
Account policy
Cookie
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder.
Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Manager's group.
What should you do? (8.3)
Add his user account to the ACL for the shared folder
Have Marcus log off and log back in
Manually refresh Group Policy settings on his computer
Manually refresh Group Policy settings on the file server
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
(8.3) Which security mechanism uses a unique list that meets the following specifications?
- The list is embedded directly in the object itself
- The list defines which subjects have access to certain objects
- The list specifies the level or type of access allowed to certain objects
Hasing
Kerberos
User ACL
Mandatory access control
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
(8.4) You want to prevent your browser from running JavaScript commands that are potentially harmful. Which of the following would you restrict to accomplish this?
ActiveX
Server-side scripts
CGI
Client-side scripts
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
(8.4) A programmer that fails to check the length of input before processing leaves their code vulnerable to what form of common attack?
Privilege escalation
Session hijacking
Buffer overflow
Backdoor
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
(8.4) Which of the following is an attack that injects malicious scripts into web pages to redirect users to fake websites or gather personal information?
Drive-by download
SQL injection
XSS
DLL injection
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?