
IEEE QUIZ
Authored by Thuraka Sreeram
Education
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The individual who periodically reviews security settings and maintains records of access by users is called the _____.
Manager
Custodian
Owner
Supervisor
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a flaw in standard operating systems?
Operating systems cannot create a trusted path between users and applications.
Operating systems are complex programs with millions of lines of code that make
vulnerabilities extremely difficult to recognize.
Operating systems do not isolate applications from each another so that one
application that is compromised can impact the entire computer.
Operating systems by default use the principle of least privilege.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hashing would not be used in which of the following examples?
Bank automatic teller machine (ATM)
Verifying a user password entered on a Linux system
Determining the integrity of a message
Encrypting and decrypting e-mail attachments
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user account that has not been accessed for a lengthy period of time is called a(n) _____ account.
Orphaned
Static
Limbo
Dormant
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A(n) _____ constructs LDAP statements based on user inputs in order to retrieve information from the database or modify its contents.
SQL/LDAP insert attack
RBASE plug-in attack
Modified Trojan attack
LDAP injection attack
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The individual who periodically reviews security settings and maintains records of access by users is called the _____.
Manager
Owner
Supervisor
Custodian
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The areas of a file in which steganography can hide data include all of the following except ______.
In the directory structure of the file system
In areas that contain the content data itself
In the file header fields that describe the file
In data that is used to describe the content or structure of the actual data
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?