Search Header Logo

TestOut SecurityPro (8.6-8.7)

Authored by James Stephens

Computers

University

Used 3+ times

TestOut SecurityPro (8.6-8.7)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

(8.6) Which of the following enters random data to the inputs of an application?

Fuzzing

Validation rules

Application hardening

Routines

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

(8.6) Which of the following is specifically meant to ensure that a program operates on clean, correct, and useful data?

Error and exception handling

Application hardening

Input validation

Process spawning

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During the application development cycle, an application tester creates multiple virtual machines on a hypervisor, each with a different version and edition of Windows installed.

She then installs the latest build of the application being developed on each virtual machine and evaluates each installation for security vulnerabilities.

Which assessment technique was used in this scenario?

Code review

Configuration testing

Baseline reporting

Fuzzing

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

(8.6) During the application development cycle, a developer asks several of his peers to assess the portion of the application's code he was assigned to write for security vulnerabilities.

Which assessment technique was used in this scenario?

Code review

Input validation

Fuzzing

Baseline reporting

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(8.6) You've been assigned to evaluate NoSQL databases as a part of a big data analysis initiative in your organization.


You've downloaded an open source NoSQL database from the Internet and installed it on a test system in an isolated lab environment.


Which of the following are likely to be TRUE about this test system? (Choose 2)

The default admin user password is admin

By default, data is stored in the database in an encrypted format

Data is stored in the database in an UNencrypted format

The database admin user has no password assigned

The database is more susceptible to SQL injection attacks than traditional SQL databases

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

(8.7) Which of the following is an example of a decentralized privilege management solution?

RADIUS

Workgroup

Active Directory

TACAS+

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(8.7) Which of the following best describes Active Directory?

A group of related domains that share the same contiguous DNS namespace

A centralized database that contains user account and security information

An administratively-defined collection of network resources that share a common directory database and security policies

A collection of related domain trees that establishes the relationship between trees that have different DNS namespaces

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?