Host and Application Security

Host and Application Security

Professional Development

10 Qs

quiz-placeholder

Similar activities

Security+ Study Guide-09 Implementing Controls to Protect Assets

Security+ Study Guide-09 Implementing Controls to Protect Assets

Professional Development

15 Qs

Software Reviews & Testing

Software Reviews & Testing

Professional Development

10 Qs

IT ENGLISH: Research Project Topics - Blockchain Technology

IT ENGLISH: Research Project Topics - Blockchain Technology

Professional Development

10 Qs

AWS Cloud

AWS Cloud

Professional Development

15 Qs

Searching and Sorting

Searching and Sorting

University - Professional Development

15 Qs

CompTIA Cloud Plus Lesson 2

CompTIA Cloud Plus Lesson 2

Professional Development

14 Qs

ASF quiz

ASF quiz

Professional Development

8 Qs

Cybersecurity

Cybersecurity

Professional Development

10 Qs

Host and Application Security

Host and Application Security

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Usama Yehia Ibrahim

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Fuzz testing works best in which of the following testing environments?

Known environment testing

Partially known environment testing

Unknown environment testing

Fuzz testing works equally well in all of the above.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which code analysis method is performed while the software is executed, either on a target system or an emulated system?

Static analysis

Runtime analysis

Sandbox analysis

Dynamic analysis

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following are associated with endpoint protection? (Choose all that apply.)

EDR

TPM

DLP

HTTP headers

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You have a series of web servers that you wish to harden. Which of the following is the best solution for this case?

A block list/deny list

An allow list

Secure cookies

Code signing

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are examining the server infrastructure and wish to harden the machines in your server farm. Which is the first task you should perform across all of your servers?

Apply a block list/deny list.

Apply an allow list

Block open ports and disable unused services

Employ disk encryption.

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Databases can use which of the following for security? (Choose all that apply.)

Tokenization

Salting

Code signing

Secure cookies

7.

MULTIPLE SELECT QUESTION

1 min • 1 pt

When you’re creating a website, which of the following will provide protection against user attacks against your site? (Choose all that apply.)

Tokenization

HTTP headers

Code signing

Fuzzing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?