
TestOut SecurityPro (8.2-8.5)
Quiz
•
Computers
•
University
•
Practice Problem
•
Hard
James Stephens
Used 8+ times
FREE Resource
Enhance your content in a minute
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following information is typically not included in an access token?
User security identifier
Group memebership
User rights
User account password
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following terms describes the component that is generated following authentication and is used to gain access to resources following login?
Proxy
Access token
Account policy
Cookie
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder.
Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Manager's group.
What should you do? (8.3)
Add his user account to the ACL for the shared folder
Have Marcus log off and log back in
Manually refresh Group Policy settings on his computer
Manually refresh Group Policy settings on the file server
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
(8.3) Which security mechanism uses a unique list that meets the following specifications?
- The list is embedded directly in the object itself
- The list defines which subjects have access to certain objects
- The list specifies the level or type of access allowed to certain objects
Hasing
Kerberos
User ACL
Mandatory access control
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
(8.4) You want to prevent your browser from running JavaScript commands that are potentially harmful. Which of the following would you restrict to accomplish this?
ActiveX
Server-side scripts
CGI
Client-side scripts
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
(8.4) A programmer that fails to check the length of input before processing leaves their code vulnerable to what form of common attack?
Privilege escalation
Session hijacking
Buffer overflow
Backdoor
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
(8.4) Which of the following is an attack that injects malicious scripts into web pages to redirect users to fake websites or gather personal information?
Drive-by download
SQL injection
XSS
DLL injection
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Fintech
Quiz
•
University
15 questions
Firewall and Network Security
Quiz
•
University
18 questions
PBO Inheritance Episode 2
Quiz
•
University
15 questions
DBC CHAPTER 3 - REVISION
Quiz
•
University
15 questions
4.6.4 Logic Gates
Quiz
•
10th Grade - Professi...
20 questions
Information Management - QUIZ
Quiz
•
University
15 questions
GAME QUIZ!!
Quiz
•
University
15 questions
ADVACOMT-Quiz No.1 (final term)
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
