IEEE QUIZ

IEEE QUIZ

University

20 Qs

quiz-placeholder

Similar activities

DATABASE DESIGN REVISION (1-5)

DATABASE DESIGN REVISION (1-5)

University

15 Qs

BCS Network Security Test 2

BCS Network Security Test 2

University - Professional Development

18 Qs

PL SQL

PL SQL

University - Professional Development

20 Qs

Fallacies

Fallacies

University

15 Qs

HI-5 2631

HI-5 2631

University

15 Qs

BCS Network Security Test 4

BCS Network Security Test 4

University

18 Qs

BSDP Petugas IT

BSDP Petugas IT

University

20 Qs

UI designing

UI designing

12th Grade - University

20 Qs

IEEE QUIZ

IEEE QUIZ

Assessment

Quiz

Education

University

Hard

Created by

Thuraka Sreeram

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The individual who periodically reviews security settings and maintains records of access by users is called the _____.

Manager

Custodian

Owner

Supervisor

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a flaw in standard operating systems?

Operating systems cannot create a trusted path between users and applications.

Operating systems are complex programs with millions of lines of code that make
vulnerabilities extremely difficult to recognize.

Operating systems do not isolate applications from each another so that one

application that is compromised can impact the entire computer.

Operating systems by default use the principle of least privilege.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hashing would not be used in which of the following examples?

Bank automatic teller machine (ATM)

Verifying a user password entered on a Linux system

Determining the integrity of a message

Encrypting and decrypting e-mail attachments

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user account that has not been accessed for a lengthy period of time is called a(n) _____ account.

Orphaned

Static

Limbo

Dormant

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) _____ constructs LDAP statements based on user inputs in order to retrieve information from the database or modify its contents.


SQL/LDAP insert attack


RBASE plug-in attack


Modified Trojan attack

LDAP injection attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The individual who periodically reviews security settings and maintains records of access by users is called the _____.

Manager

Owner

Supervisor

Custodian

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The areas of a file in which steganography can hide data include all of the following except ______.

In the directory structure of the file system


In areas that contain the content data itself

In the file header fields that describe the file

In data that is used to describe the content or structure of the actual data

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?