Topic 9- 12 : User Access - Application Control

Topic 9- 12 : User Access - Application Control

University

20 Qs

Student preview

quiz-placeholder

Similar activities

F2 User Access and Permissions Quiz

F2 User Access and Permissions Quiz

12th Grade - University

15 Qs

Cloud Computing 11

Cloud Computing 11

University

20 Qs

Cyber EOP - Password Policies By Mr. B

Cyber EOP - Password Policies By Mr. B

12th Grade - University

18 Qs

Chapter 6 - Unix II

Chapter 6 - Unix II

University

15 Qs

Cyber Incident Quiz

Cyber Incident Quiz

12th Grade - University

15 Qs

Itec285 End of Year

Itec285 End of Year

University

17 Qs

IT Essentials Ch 13 Review - Security

IT Essentials Ch 13 Review - Security

9th Grade - University

18 Qs

CHAPTER 4 HARDENING OPERATING SYSTEM

CHAPTER 4 HARDENING OPERATING SYSTEM

University

18 Qs

Topic 9- 12 : User Access - Application Control

Topic 9- 12 : User Access - Application Control

Assessment

Quiz

Created by

SPACE_DIPLOMA_IT SPACE_DIPLOMA_IT

Computers

University

Hard

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which approach provides the best outcome for software control?

Application only

Database control only

Operating system only

All three in combination

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common issue with poorly configured security packages?

They don't require maintenance

They allow high user functionality

They may cause more harm than good

They require minimal specialist knowledge

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

ISO 27002 recommends which control for database access?

Unrestricted user access

Asset or data ownership only

Isolating critical systems

Unlimited privileges for all users

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a function of the NIST Cyber Security Framework?

Identifying incidents

Limiting incident damage

Ensuring data redundancy

Restoring capabilities

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which control method is recommended by ISO 27002 for application input validation?

Buffer Overflow Management

Batch, Balancing, and Integrity checks

Only Batch processing

Selective Application Logs

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol ensures a secure internet connection and prevents data modification?

IPSec

SSL

S/MIME

SMTP

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary issue with social engineering attacks in e-commerce?

It increases site traffic

It leverages insider information

It uses knowledge from the internet

It requires face-to-face interaction

Explore all questions with a free account

or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?