(8.6) Which of the following enters random data to the inputs of an application?
TestOut SecurityPro (8.6-8.7)

Quiz
•
Computers
•
University
•
Hard

James Stephens
Used 3+ times
FREE Resource
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Fuzzing
Validation rules
Application hardening
Routines
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
(8.6) Which of the following is specifically meant to ensure that a program operates on clean, correct, and useful data?
Error and exception handling
Application hardening
Input validation
Process spawning
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During the application development cycle, an application tester creates multiple virtual machines on a hypervisor, each with a different version and edition of Windows installed.
She then installs the latest build of the application being developed on each virtual machine and evaluates each installation for security vulnerabilities.
Which assessment technique was used in this scenario?
Code review
Configuration testing
Baseline reporting
Fuzzing
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
(8.6) During the application development cycle, a developer asks several of his peers to assess the portion of the application's code he was assigned to write for security vulnerabilities.
Which assessment technique was used in this scenario?
Code review
Input validation
Fuzzing
Baseline reporting
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
(8.6) You've been assigned to evaluate NoSQL databases as a part of a big data analysis initiative in your organization.
You've downloaded an open source NoSQL database from the Internet and installed it on a test system in an isolated lab environment.
Which of the following are likely to be TRUE about this test system? (Choose 2)
The default admin user password is admin
By default, data is stored in the database in an encrypted format
Data is stored in the database in an UNencrypted format
The database admin user has no password assigned
The database is more susceptible to SQL injection attacks than traditional SQL databases
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
(8.7) Which of the following is an example of a decentralized privilege management solution?
RADIUS
Workgroup
Active Directory
TACAS+
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
(8.7) Which of the following best describes Active Directory?
A group of related domains that share the same contiguous DNS namespace
A centralized database that contains user account and security information
An administratively-defined collection of network resources that share a common directory database and security policies
A collection of related domain trees that establishes the relationship between trees that have different DNS namespaces
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
(8.7) Active Directory is a hierarchical database. Hierarchical directory databases have several advantages over flat file database structures.
Which of the following is NOT an advantage of Active Directory's hierarchical database structure?
Decentralization
Organization
Replication
Scalability
Delegation
Similar Resources on Quizizz
10 questions
DBMS

Quiz
•
University
9 questions
Database Introduction 1

Quiz
•
University
12 questions
Node.js Database Connection

Quiz
•
University
10 questions
CH 3(2)-Database Design

Quiz
•
University
10 questions
Client Server

Quiz
•
1st Grade - University
10 questions
Quiz 4: MySQL Database

Quiz
•
University
12 questions
Active Directory Quiz

Quiz
•
University
10 questions
DBMS Lab Quiz 1 2B3

Quiz
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade