An invalid input is intentionally entered in an application to check if the application can handle it. Which type of testing is performed?
CompTIA Security+ Practice Exam 2

Quiz
•
Computers
•
University
•
Medium
Kyle Atkins
Used 18+ times
FREE Resource
37 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Stress
User acceptance
Fuzzing
Regression
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following statements are true of input validation?
Each correct answer represents a complete solution. Choose three.
Helps to overcome buffer overflow and DoS attack
Includes sending any unexpected or maliciously crafted input to a system
Ensures that different types of input are handled gracefully by an application
Requires a user login with normal characters as input during testing
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following fully implements the 802.11i security requirements?
WPS
WPA
WPA2
WEP
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A directory protocol that includes all the information about a network is a/an:
SIP protocol
LDAP protocol
SNMP protocol
RADIUS protocol
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company has developed an application which is undergoing the testing process. According to the results of the testing process, some changes have been made to the application. The company now wishes to check whether the changes made in the application have caused the previously existing functionality to fail or not. Which test should the company perform?
Manual peer review
User acceptance
Regression
Stress
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following statements are true about asymmetric encryption?
Each correct answer represents a complete solution. Choose two.
It is faster as compared to symmetric encryption
Only one key is needed to encrypt and decrypt data in it
In asymmetric encryption, the public key is distributed and the private key is available only to the recipient of the message
It uses a public key and private key for data encryption
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following password attacks calculates all the possible hashes for a set of characters and stores them in a table?
Brute force
Hybrid
Dictionary
Rainbow
Create a free account and access millions of resources
Similar Resources on Wayground
38 questions
NET1L - Lesson 1 (Internet Connections - Reliable Networks)

Quiz
•
University
40 questions
Prelim Examination: Networks and Communication

Quiz
•
University
34 questions
Module 1.1 - Introduction to GRC

Quiz
•
University
34 questions
Cybersecurity Formative Assessment

Quiz
•
12th Grade - University
40 questions
System Monitoring Tools Quiz

Quiz
•
12th Grade - University
40 questions
Nerds quiz

Quiz
•
University
34 questions
CompTIA Security+ SY0-601 Chapter 13 - 15

Quiz
•
University
40 questions
NETWORK & COMMUNICATION FINAL (Long Quiz)

Quiz
•
University
Popular Resources on Wayground
25 questions
Equations of Circles

Quiz
•
10th - 11th Grade
30 questions
Week 5 Memory Builder 1 (Multiplication and Division Facts)

Quiz
•
9th Grade
33 questions
Unit 3 Summative - Summer School: Immune System

Quiz
•
10th Grade
10 questions
Writing and Identifying Ratios Practice

Quiz
•
5th - 6th Grade
36 questions
Prime and Composite Numbers

Quiz
•
5th Grade
14 questions
Exterior and Interior angles of Polygons

Quiz
•
8th Grade
37 questions
Camp Re-cap Week 1 (no regression)

Quiz
•
9th - 12th Grade
46 questions
Biology Semester 1 Review

Quiz
•
10th Grade