
TestOut SecurityPro (8.6-8.7)
Authored by James Stephens
Computers
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
(8.6) Which of the following enters random data to the inputs of an application?
Fuzzing
Validation rules
Application hardening
Routines
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
(8.6) Which of the following is specifically meant to ensure that a program operates on clean, correct, and useful data?
Error and exception handling
Application hardening
Input validation
Process spawning
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During the application development cycle, an application tester creates multiple virtual machines on a hypervisor, each with a different version and edition of Windows installed.
She then installs the latest build of the application being developed on each virtual machine and evaluates each installation for security vulnerabilities.
Which assessment technique was used in this scenario?
Code review
Configuration testing
Baseline reporting
Fuzzing
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
(8.6) During the application development cycle, a developer asks several of his peers to assess the portion of the application's code he was assigned to write for security vulnerabilities.
Which assessment technique was used in this scenario?
Code review
Input validation
Fuzzing
Baseline reporting
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
(8.6) You've been assigned to evaluate NoSQL databases as a part of a big data analysis initiative in your organization.
You've downloaded an open source NoSQL database from the Internet and installed it on a test system in an isolated lab environment.
Which of the following are likely to be TRUE about this test system? (Choose 2)
The default admin user password is admin
By default, data is stored in the database in an encrypted format
Data is stored in the database in an UNencrypted format
The database admin user has no password assigned
The database is more susceptible to SQL injection attacks than traditional SQL databases
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
(8.7) Which of the following is an example of a decentralized privilege management solution?
RADIUS
Workgroup
Active Directory
TACAS+
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
(8.7) Which of the following best describes Active Directory?
A group of related domains that share the same contiguous DNS namespace
A centralized database that contains user account and security information
An administratively-defined collection of network resources that share a common directory database and security policies
A collection of related domain trees that establishes the relationship between trees that have different DNS namespaces
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?