IEEE QUIZ

IEEE QUIZ

University

20 Qs

quiz-placeholder

Similar activities

Audiology - Unit 2 Test

Audiology - Unit 2 Test

University

15 Qs

Noise Control & Acoustic Design

Noise Control & Acoustic Design

University

17 Qs

Sosiologi Pendidikan

Sosiologi Pendidikan

University

20 Qs

Reported speech assignment

Reported speech assignment

University

20 Qs

HMS UNIT 1

HMS UNIT 1

University

15 Qs

Chapter 1 Introduction to cost and management accounting

Chapter 1 Introduction to cost and management accounting

University

17 Qs

Quiz Belum Berjudul

Quiz Belum Berjudul

6th Grade - University

20 Qs

chapter 1 : audit documentation

chapter 1 : audit documentation

University

20 Qs

IEEE QUIZ

IEEE QUIZ

Assessment

Quiz

Education

University

Practice Problem

Hard

Created by

Thuraka Sreeram

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The individual who periodically reviews security settings and maintains records of access by users is called the _____.

Manager

Custodian

Owner

Supervisor

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a flaw in standard operating systems?

Operating systems cannot create a trusted path between users and applications.

Operating systems are complex programs with millions of lines of code that make
vulnerabilities extremely difficult to recognize.

Operating systems do not isolate applications from each another so that one

application that is compromised can impact the entire computer.

Operating systems by default use the principle of least privilege.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hashing would not be used in which of the following examples?

Bank automatic teller machine (ATM)

Verifying a user password entered on a Linux system

Determining the integrity of a message

Encrypting and decrypting e-mail attachments

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user account that has not been accessed for a lengthy period of time is called a(n) _____ account.

Orphaned

Static

Limbo

Dormant

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) _____ constructs LDAP statements based on user inputs in order to retrieve information from the database or modify its contents.


SQL/LDAP insert attack


RBASE plug-in attack


Modified Trojan attack

LDAP injection attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The individual who periodically reviews security settings and maintains records of access by users is called the _____.

Manager

Owner

Supervisor

Custodian

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The areas of a file in which steganography can hide data include all of the following except ______.

In the directory structure of the file system


In areas that contain the content data itself

In the file header fields that describe the file

In data that is used to describe the content or structure of the actual data

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?