SS_tut4

SS_tut4

University

18 Qs

quiz-placeholder

Similar activities

Information and Communication Technology Security - Pre-Test

Information and Communication Technology Security - Pre-Test

University

20 Qs

Network Forensics and Log Capturing

Network Forensics and Log Capturing

University

15 Qs

security+ (601)

security+ (601)

9th Grade - Professional Development

20 Qs

Module 11

Module 11

9th Grade - Professional Development

20 Qs

SYO 701 EDR Module FC

SYO 701 EDR Module FC

University

20 Qs

INASEC1-SecurityTechnology 2324B

INASEC1-SecurityTechnology 2324B

University

15 Qs

ASM655  Chapter 1 Quiz

ASM655 Chapter 1 Quiz

University

20 Qs

Security+ Wireless Security Quiz

Security+ Wireless Security Quiz

University

20 Qs

SS_tut4

SS_tut4

Assessment

Quiz

Computers

University

Medium

Created by

Salma waleed

Used 3+ times

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Requiring users to create passwords that are 20 characters long and include uppercase and lowercase letters, numbers, and symbols violates which security principle?

Weakest Link

Psychological Acceptability

Leveraging Existing Components

Attack Surface Minimization

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following BEST describes the core concept of the 'Weakest Link' security principle?

All components of a system must have equal levels of security.

Focusing security efforts solely on publicly accessible systems.

Identifying and prioritizing the most vulnerable components of a system.

Using complex passwords to deter attackers.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Service-Oriented Architecture (SOA) is an example of which security principle?

Weakest Link

Attack Surface Reduction

Leveraging Existing Components

Defense in Depth

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the lecture, a complex system with a single public API generally has:

A minimal attack surface

A maximal attack surface

An attack surface that is difficult to calculate

An attack surface independent of system complexity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Relative Attack Surface Quotient (RASQ) is used to:

Determine the absolute number of vulnerabilities in a system.

Compare the relative 'attackability' of different versions of a system.

Calculate the time it takes an attacker to compromise a system.

Identify the weakest link in a software application.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is a CORRECT pairing of a control type and its function?

Preventative control - Restores a system after a security breach.

Detective control - Prevents unauthorized access to a system.

Corrective control - Reverses the impact of a security incident, such as restoring from a backup.

Deterrent control - Identifies security policy violations.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is generally considered best practice to disable protocols at which layer of the OSI model?

Application Layer

Transport Layer

Session Layer

Network Layer

Answer explanation

Disabling protocols is best done at the Application Layer because it directly manages user-level applications and services, allowing for better control over security and resource usage.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?