TestOut SecurityPro (8.6-8.7)

Quiz
•
Computers
•
University
•
Hard

James Stephens
Used 3+ times
FREE Resource
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
(8.6) Which of the following enters random data to the inputs of an application?
Fuzzing
Validation rules
Application hardening
Routines
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
(8.6) Which of the following is specifically meant to ensure that a program operates on clean, correct, and useful data?
Error and exception handling
Application hardening
Input validation
Process spawning
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During the application development cycle, an application tester creates multiple virtual machines on a hypervisor, each with a different version and edition of Windows installed.
She then installs the latest build of the application being developed on each virtual machine and evaluates each installation for security vulnerabilities.
Which assessment technique was used in this scenario?
Code review
Configuration testing
Baseline reporting
Fuzzing
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
(8.6) During the application development cycle, a developer asks several of his peers to assess the portion of the application's code he was assigned to write for security vulnerabilities.
Which assessment technique was used in this scenario?
Code review
Input validation
Fuzzing
Baseline reporting
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
(8.6) You've been assigned to evaluate NoSQL databases as a part of a big data analysis initiative in your organization.
You've downloaded an open source NoSQL database from the Internet and installed it on a test system in an isolated lab environment.
Which of the following are likely to be TRUE about this test system? (Choose 2)
The default admin user password is admin
By default, data is stored in the database in an encrypted format
Data is stored in the database in an UNencrypted format
The database admin user has no password assigned
The database is more susceptible to SQL injection attacks than traditional SQL databases
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
(8.7) Which of the following is an example of a decentralized privilege management solution?
RADIUS
Workgroup
Active Directory
TACAS+
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
(8.7) Which of the following best describes Active Directory?
A group of related domains that share the same contiguous DNS namespace
A centralized database that contains user account and security information
An administratively-defined collection of network resources that share a common directory database and security policies
A collection of related domain trees that establishes the relationship between trees that have different DNS namespaces
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
(8.7) Active Directory is a hierarchical database. Hierarchical directory databases have several advantages over flat file database structures.
Which of the following is NOT an advantage of Active Directory's hierarchical database structure?
Decentralization
Organization
Replication
Scalability
Delegation
Similar Resources on Wayground
10 questions
Web Development - Quiz 1

Quiz
•
University
10 questions
Introduction to database systems

Quiz
•
University
11 questions
Data base Management System

Quiz
•
University
10 questions
Q1_PlatformTech

Quiz
•
University
10 questions
RDBMS

Quiz
•
University
13 questions
SQL Practice

Quiz
•
University
7 questions
QUIZ - ADDBASE 5-6

Quiz
•
University
10 questions
Web environments

Quiz
•
University
Popular Resources on Wayground
55 questions
CHS Student Handbook 25-26

Quiz
•
9th Grade
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
10 questions
Chaffey

Quiz
•
9th - 12th Grade
15 questions
PRIDE

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
22 questions
6-8 Digital Citizenship Review

Quiz
•
6th - 8th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade