IEEE QUIZ

IEEE QUIZ

University

20 Qs

quiz-placeholder

Similar activities

TECH TERMS REVIEW

TECH TERMS REVIEW

University

20 Qs

Eiken One Part One #1

Eiken One Part One #1

1st Grade - Professional Development

20 Qs

UK Educational System

UK Educational System

University

18 Qs

Competitive Dynamics & Setting Product Strategy

Competitive Dynamics & Setting Product Strategy

University - Professional Development

20 Qs

Key Signatures

Key Signatures

1st Grade - University

15 Qs

Kuis 3

Kuis 3

KG - Professional Development

23 Qs

CySa+ PT5: 2 of 3

CySa+ PT5: 2 of 3

9th Grade - Professional Development

20 Qs

Public Relations

Public Relations

10th Grade - University

17 Qs

IEEE QUIZ

IEEE QUIZ

Assessment

Quiz

Education

University

Hard

Created by

Thuraka Sreeram

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The individual who periodically reviews security settings and maintains records of access by users is called the _____.

Manager

Custodian

Owner

Supervisor

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a flaw in standard operating systems?

Operating systems cannot create a trusted path between users and applications.

Operating systems are complex programs with millions of lines of code that make
vulnerabilities extremely difficult to recognize.

Operating systems do not isolate applications from each another so that one

application that is compromised can impact the entire computer.

Operating systems by default use the principle of least privilege.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hashing would not be used in which of the following examples?

Bank automatic teller machine (ATM)

Verifying a user password entered on a Linux system

Determining the integrity of a message

Encrypting and decrypting e-mail attachments

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user account that has not been accessed for a lengthy period of time is called a(n) _____ account.

Orphaned

Static

Limbo

Dormant

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A(n) _____ constructs LDAP statements based on user inputs in order to retrieve information from the database or modify its contents.


SQL/LDAP insert attack


RBASE plug-in attack


Modified Trojan attack

LDAP injection attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The individual who periodically reviews security settings and maintains records of access by users is called the _____.

Manager

Owner

Supervisor

Custodian

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The areas of a file in which steganography can hide data include all of the following except ______.

In the directory structure of the file system


In areas that contain the content data itself

In the file header fields that describe the file

In data that is used to describe the content or structure of the actual data

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?