TestOut SecurityPro (8.6-8.7)

TestOut SecurityPro (8.6-8.7)

University

8 Qs

quiz-placeholder

Similar activities

DBMS

DBMS

University

10 Qs

SQL Queries

SQL Queries

University

10 Qs

Node.js Database Connection

Node.js Database Connection

University

12 Qs

SQL - Relational Database and tables

SQL - Relational Database and tables

University

12 Qs

DBMS-III B.C.A

DBMS-III B.C.A

University

10 Qs

Relational database

Relational database

University

12 Qs

CH 3(2)-Database Design

CH 3(2)-Database Design

University

10 Qs

Database Query

Database Query

University

10 Qs

TestOut SecurityPro (8.6-8.7)

TestOut SecurityPro (8.6-8.7)

Assessment

Quiz

Computers

University

Hard

Created by

James Stephens

Used 3+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

(8.6) Which of the following enters random data to the inputs of an application?

Fuzzing

Validation rules

Application hardening

Routines

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

(8.6) Which of the following is specifically meant to ensure that a program operates on clean, correct, and useful data?

Error and exception handling

Application hardening

Input validation

Process spawning

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During the application development cycle, an application tester creates multiple virtual machines on a hypervisor, each with a different version and edition of Windows installed.

She then installs the latest build of the application being developed on each virtual machine and evaluates each installation for security vulnerabilities.

Which assessment technique was used in this scenario?

Code review

Configuration testing

Baseline reporting

Fuzzing

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

(8.6) During the application development cycle, a developer asks several of his peers to assess the portion of the application's code he was assigned to write for security vulnerabilities.

Which assessment technique was used in this scenario?

Code review

Input validation

Fuzzing

Baseline reporting

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(8.6) You've been assigned to evaluate NoSQL databases as a part of a big data analysis initiative in your organization.


You've downloaded an open source NoSQL database from the Internet and installed it on a test system in an isolated lab environment.


Which of the following are likely to be TRUE about this test system? (Choose 2)

The default admin user password is admin

By default, data is stored in the database in an encrypted format

Data is stored in the database in an UNencrypted format

The database admin user has no password assigned

The database is more susceptible to SQL injection attacks than traditional SQL databases

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

(8.7) Which of the following is an example of a decentralized privilege management solution?

RADIUS

Workgroup

Active Directory

TACAS+

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(8.7) Which of the following best describes Active Directory?

A group of related domains that share the same contiguous DNS namespace

A centralized database that contains user account and security information

An administratively-defined collection of network resources that share a common directory database and security policies

A collection of related domain trees that establishes the relationship between trees that have different DNS namespaces

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(8.7) Active Directory is a hierarchical database. Hierarchical directory databases have several advantages over flat file database structures.


Which of the following is NOT an advantage of Active Directory's hierarchical database structure?

Decentralization

Organization

Replication

Scalability

Delegation