Topic 9- 12 : User Access - Application Control

Topic 9- 12 : User Access - Application Control

University

20 Qs

quiz-placeholder

Similar activities

Relational Algebra and Calculus

Relational Algebra and Calculus

University

20 Qs

ITN_Explore the networks_1.1 Globally connected

ITN_Explore the networks_1.1 Globally connected

11th Grade - University

20 Qs

Artificial Intelligence CT-1

Artificial Intelligence CT-1

University

20 Qs

Computational Thinking in Python[Quiz 3]

Computational Thinking in Python[Quiz 3]

University

15 Qs

DWDM-2

DWDM-2

University

20 Qs

Kuis Artificial Intelligence

Kuis Artificial Intelligence

University

15 Qs

c.i.s.c.o

c.i.s.c.o

University

20 Qs

Topic 9- 12 : User Access - Application Control

Topic 9- 12 : User Access - Application Control

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

SPACE_DIPLOMA_IT SPACE_DIPLOMA_IT

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which approach provides the best outcome for software control?

Application only

Database control only

Operating system only

All three in combination

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common issue with poorly configured security packages?

They don't require maintenance

They allow high user functionality

They may cause more harm than good

They require minimal specialist knowledge

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

ISO 27002 recommends which control for database access?

Unrestricted user access

Asset or data ownership only

Isolating critical systems

Unlimited privileges for all users

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a function of the NIST Cyber Security Framework?

Identifying incidents

Limiting incident damage

Ensuring data redundancy

Restoring capabilities

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which control method is recommended by ISO 27002 for application input validation?

Buffer Overflow Management

Batch, Balancing, and Integrity checks

Only Batch processing

Selective Application Logs

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol ensures a secure internet connection and prevents data modification?

IPSec

SSL

S/MIME

SMTP

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary issue with social engineering attacks in e-commerce?

It increases site traffic

It leverages insider information

It uses knowledge from the internet

It requires face-to-face interaction

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?