IEEE QUIZ

IEEE QUIZ

University

20 Qs

quiz-placeholder

Similar activities

Past Passive Voice

Past Passive Voice

9th Grade - University

15 Qs

BFSM 4

BFSM 4

University

20 Qs

MITRE ATT&CK

MITRE ATT&CK

University

25 Qs

TOEFL (Structure)

TOEFL (Structure)

9th Grade - Professional Development

15 Qs

World Trivia

World Trivia

University

15 Qs

CVS Symptoms

CVS Symptoms

University

24 Qs

MANUFACTURING TECHNOLOGY II - MCQ UNIT TEST 1

MANUFACTURING TECHNOLOGY II - MCQ UNIT TEST 1

University

20 Qs

Setting the Stage for Possitive Behaviour

Setting the Stage for Possitive Behaviour

University

15 Qs

IEEE QUIZ

IEEE QUIZ

Assessment

Quiz

Education

University

Hard

Created by

Thuraka Sreeram

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The individual who periodically reviews security settings and maintains records of access by users is called the _____.

Manager

Custodian

Owner

Supervisor

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a flaw in standard operating systems?

Operating systems cannot create a trusted path between users and applications.

Operating systems are complex programs with millions of lines of code that make
vulnerabilities extremely difficult to recognize.

Operating systems do not isolate applications from each another so that one

application that is compromised can impact the entire computer.

Operating systems by default use the principle of least privilege.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hashing would not be used in which of the following examples?

Bank automatic teller machine (ATM)

Verifying a user password entered on a Linux system

Determining the integrity of a message

Encrypting and decrypting e-mail attachments

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user account that has not been accessed for a lengthy period of time is called a(n) _____ account.

Orphaned

Static

Limbo

Dormant

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) _____ constructs LDAP statements based on user inputs in order to retrieve information from the database or modify its contents.


SQL/LDAP insert attack


RBASE plug-in attack


Modified Trojan attack

LDAP injection attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The individual who periodically reviews security settings and maintains records of access by users is called the _____.

Manager

Owner

Supervisor

Custodian

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The areas of a file in which steganography can hide data include all of the following except ______.

In the directory structure of the file system


In areas that contain the content data itself

In the file header fields that describe the file

In data that is used to describe the content or structure of the actual data

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?