Search Header Logo

SS_tut4

Authored by Salma waleed

Computers

University

Used 3+ times

SS_tut4
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Requiring users to create passwords that are 20 characters long and include uppercase and lowercase letters, numbers, and symbols violates which security principle?

Weakest Link

Psychological Acceptability

Leveraging Existing Components

Attack Surface Minimization

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following BEST describes the core concept of the 'Weakest Link' security principle?

All components of a system must have equal levels of security.

Focusing security efforts solely on publicly accessible systems.

Identifying and prioritizing the most vulnerable components of a system.

Using complex passwords to deter attackers.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Service-Oriented Architecture (SOA) is an example of which security principle?

Weakest Link

Attack Surface Reduction

Leveraging Existing Components

Defense in Depth

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the lecture, a complex system with a single public API generally has:

A minimal attack surface

A maximal attack surface

An attack surface that is difficult to calculate

An attack surface independent of system complexity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Relative Attack Surface Quotient (RASQ) is used to:

Determine the absolute number of vulnerabilities in a system.

Compare the relative 'attackability' of different versions of a system.

Calculate the time it takes an attacker to compromise a system.

Identify the weakest link in a software application.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a CORRECT pairing of a control type and its function?

Preventative control - Restores a system after a security breach.

Detective control - Prevents unauthorized access to a system.

Corrective control - Reverses the impact of a security incident, such as restoring from a backup.

Deterrent control - Identifies security policy violations.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is generally considered best practice to disable protocols at which layer of the OSI model?

Application Layer

Transport Layer

Session Layer

Network Layer

Answer explanation

Disabling protocols is best done at the Application Layer because it directly manages user-level applications and services, allowing for better control over security and resource usage.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?