IEEE QUIZ

IEEE QUIZ

University

20 Qs

quiz-placeholder

Similar activities

Kuis Studi Pendahuluan Media Pembelajaran

Kuis Studi Pendahuluan Media Pembelajaran

University

20 Qs

Test # 1_EDUC175 Principles of Teaching

Test # 1_EDUC175 Principles of Teaching

University

15 Qs

Early Mathematics in early childhood

Early Mathematics in early childhood

University

15 Qs

BSD Online Quiz

BSD Online Quiz

University

15 Qs

Kurikulum dan Pembelajaran FK Univ. YARSI

Kurikulum dan Pembelajaran FK Univ. YARSI

University

15 Qs

Factors Affecting Fixed Capital Requirement - Topic 2

Factors Affecting Fixed Capital Requirement - Topic 2

KG - University

15 Qs

Singapore

Singapore

12th Grade - Professional Development

15 Qs

IMPORTANT BRANDING DECISSIONS

IMPORTANT BRANDING DECISSIONS

University

15 Qs

IEEE QUIZ

IEEE QUIZ

Assessment

Quiz

Education

University

Practice Problem

Hard

Created by

Thuraka Sreeram

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The individual who periodically reviews security settings and maintains records of access by users is called the _____.

Manager

Custodian

Owner

Supervisor

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a flaw in standard operating systems?

Operating systems cannot create a trusted path between users and applications.

Operating systems are complex programs with millions of lines of code that make
vulnerabilities extremely difficult to recognize.

Operating systems do not isolate applications from each another so that one

application that is compromised can impact the entire computer.

Operating systems by default use the principle of least privilege.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hashing would not be used in which of the following examples?

Bank automatic teller machine (ATM)

Verifying a user password entered on a Linux system

Determining the integrity of a message

Encrypting and decrypting e-mail attachments

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user account that has not been accessed for a lengthy period of time is called a(n) _____ account.

Orphaned

Static

Limbo

Dormant

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) _____ constructs LDAP statements based on user inputs in order to retrieve information from the database or modify its contents.


SQL/LDAP insert attack


RBASE plug-in attack


Modified Trojan attack

LDAP injection attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The individual who periodically reviews security settings and maintains records of access by users is called the _____.

Manager

Owner

Supervisor

Custodian

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The areas of a file in which steganography can hide data include all of the following except ______.

In the directory structure of the file system


In areas that contain the content data itself

In the file header fields that describe the file

In data that is used to describe the content or structure of the actual data

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?