TestOut SecurityPro (8.2-8.5)

TestOut SecurityPro (8.2-8.5)

University

19 Qs

quiz-placeholder

Similar activities

Quiz Harian Gdevelop MPK

Quiz Harian Gdevelop MPK

University

20 Qs

IP-адрес безопасности

IP-адрес безопасности

8th Grade - Professional Development

15 Qs

Kuis Pemrograman Dasar

Kuis Pemrograman Dasar

University

20 Qs

Computer and Other Human Inventions

Computer and Other Human Inventions

University

15 Qs

Digital and Analog transmission

Digital and Analog transmission

University

20 Qs

GIS Unit III

GIS Unit III

University

15 Qs

ICT Unit-2

ICT Unit-2

University

20 Qs

Quiz 1 CCE

Quiz 1 CCE

University

15 Qs

TestOut SecurityPro (8.2-8.5)

TestOut SecurityPro (8.2-8.5)

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

James Stephens

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following information is typically not included in an access token?

User security identifier

Group memebership

User rights

User account password

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following terms describes the component that is generated following authentication and is used to gain access to resources following login?

Proxy

Access token

Account policy

Cookie

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder.

Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Manager's group.

What should you do? (8.3)

Add his user account to the ACL for the shared folder

Have Marcus log off and log back in

Manually refresh Group Policy settings on his computer

Manually refresh Group Policy settings on the file server

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(8.3) Which security mechanism uses a unique list that meets the following specifications?

  • The list is embedded directly in the object itself
  • The list defines which subjects have access to certain objects
  • The list specifies the level or type of access allowed to certain objects

Hasing

Kerberos

User ACL

Mandatory access control

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(8.4) You want to prevent your browser from running JavaScript commands that are potentially harmful. Which of the following would you restrict to accomplish this?

ActiveX

Server-side scripts

CGI

Client-side scripts

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(8.4) A programmer that fails to check the length of input before processing leaves their code vulnerable to what form of common attack?

Privilege escalation

Session hijacking

Buffer overflow

Backdoor

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(8.4) Which of the following is an attack that injects malicious scripts into web pages to redirect users to fake websites or gather personal information?

Drive-by download

SQL injection

XSS

DLL injection

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?