Skip to main content

Question and Answer

 

 

 

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

These attacks consist of injecting malicious client-side scripts into a website and using the website as a propagation method is:

These attacks consist of injecting malicious client-side scripts into a website and using the website as a propagation method is:

XML External Entities

Cross Site Scripting (XSS)

Security Mis Configuration

Injection

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

A security principle, that ensures that authority is not circumvented in subsequent requests of an object by a subject, by checking for authorization (rights and privileges) upon every request for the object is ____.

 

A security principle, that ensures that authority is not circumvented in subsequent requests of an object by a subject, by checking for authorization (rights a

Complete Mediation

Least Privileges

Separation of Duties

Weakest Link

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

Unprotected files and Directories, unpatched flaws, unused pages are examples of:

 

 

Unprotected files and Directories, unpatched flaws, unused pages are examples of:

Injection

Data deletion

Security misconfiguration

Broken Access Control

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

The attack surface of your project seems to grow faster than it should. Which of the following is probably not a fruitful place to look?

 

The attack surface of your project seems to grow faster than it should. Which of the following is probably not a fruitful place to look?

Number of modules/routines in the project

Privilege level of the credentials used to run the application

Network address space from which the program is addressable

Privilege level of users using the application

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

Which is the legal form of hacking based on which jobs are provided in IT industries and firms?

 

Which is the legal form of hacking based on which jobs are provided in IT industries and firms?

Cracking

Non ethical Hacking

Ethical hacking

Hacktivism

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

A process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized is called ______.

 

A process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigatio

Application Security

Secure Controls

Threat Modelling

Secure Design

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

The acronym DAST stands for:

 

 

The acronym DAST stands for:

Dynamic Application Security Testing

Dynamic Application Software Testing

Data Application Security Testing

Data Application Software Testing

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

Web Application Firewall or WAF

 

 

Web Application Firewall or WAF

Is a safety gate between servers

Regulates the content exchange between two web applications

Filters the content of specific web applications

None of the above

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

Vulnerability caused due to Logic issue in authentication mechanism is called _____.

 

 

Vulnerability caused due to Logic issue in authentication mechanism is called _____.

Broken Access Control

Broken Authentication

Injection

Sensitive Data Exposure

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

The Acronym RASP stands for:

 

 

The Acronym RASP stands for:

Rapid Application Security Protocol

Random Application Security Protection

Run Time Application Self Protection

Run Time Application Security Protection

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

Application processing sensitive Data like Client Information, Employee Data, Trade Secrets is classified under security level _____.

 

Application processing sensitive Data like Client Information, Employee Data, Trade Secrets is classified under security level _____.

Level 1

Level 2

Level 3

Level 4

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

______ is maintained by the protection of data from modification by unauthorized users.

 

 

______ is maintained by the protection of data from modification by unauthorized users.

Confidentiality

Integrity

Authentication

Non-repudiation

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

This technique analyzes code for security vulnerabilities while the app is run by an automated test, human tester, or any activity ‘interacting’ with the application functionality.

 

This technique analyzes code for security vulnerabilities while the app is run by an automated test, human tester, or any activity 'interacting' with the appli

Functional Security Testing

Interactive Application Security Testing (IAST)

Performance Testing

None of the mentioned

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

Which of this is an example of physical hacking?

 

 

Which of this is an example of physical hacking?

Remote Unauthorized access

Inserting malware loaded USB to a system

SQL Injection on SQL vulnerable site

DDoS (Distributed Denial of Service) attack

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

Data ___________ is used to ensure confidentiality.

 

 

Data ___________ is used to ensure confidentiality.

Encryption

Locking

Deleting

Backup

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

Which of the following is an example of Broken Access Control attack?

 

 

Which of the following is an example of Broken Access Control attack?

Access to personal information

Brute Force Attack

View sensitive files

Code Injection

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

Which of the following is not an example of Root Cause for Sensitive Data Exposure?

 

 

Which of the following is not an example of Root Cause for Sensitive Data Exposure?

Encrypt at rest and in transit

Weak Crypto or Keys

Un Encrypted data Storage

Clear-text data transfer

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

This attack can be deployed by infusing a malicious code/Script in a website’s comment section. What is ‘this’ attack referred to here?

 

This attack can be deployed by infusing a malicious code/Script in a website's comment section. What is 'this' attack referred to here?

SQL injection

HTML Injection

Cross Site Scripting (XSS)

Cross Site Request Forgery (XSRF)

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

A security principle that aims to maintaining confidentiality, integrity and availability by defaulting to a secure state, rapid recovery of software resiliency upon design or implementation failure is _____.

 

A security principle that aims to maintaining confidentiality, integrity and availability by defaulting to a secure state, rapid recovery of software resilienc

Separation of Duties

Defense in Depth

Least Privilege

Fail Safe

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

The acronym SAST stands for:

 

 

The acronym SAST stands for:

Static Analysis Security testing

Software Analysis Security Testing

Secure Application Software Testing

Static Application Security Testing

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

Which of the following is not a best practice for preventing injection Vulnerability?

 

 

Which of the following is not a best practice for preventing injection Vulnerability?

Validating User Input

Parametrizing Queries

Accepts parameters as input

Limiting Privileges

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

Which of the following is not a common example of Insecure Deserialization Prevention?

 

 

Which of the following is not a common example of Insecure Deserialization Prevention?

Implement integrity checks or encryption of the serialized objects

Enforce strict type constraints

Isolate code that deserializes, such that it runs in very low privilege environments

Disable all unused Services

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

Which of the following is NOT a vulnerability?

 

 

Which of the following is NOT a vulnerability?

Injection

Cross Site Scripting (XSS)

Threat modeling

Broken Access Control

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

Which of the following is not an example for the purpose of Logging and Monitoring?

 

 

Which of the following is not an example for the purpose of Logging and Monitoring?

Detecting incidents

Forensic analysis

Uncovering the sequence of events leading to a cybersecurity breach

To filter input on arrival

*

https://ecgy.fa.ap2.oraclecloud.com/hcmUI/adf/images/t.gif

Which of the following is not an example of Penetration Testing?

 

 

Which of the following is not an example of Penetration Testing?

Black Box Penetration Testing

White Box Penetration Testing

Grey Box Penetration Testing

Functional Penetration Testing

 

Comments

Popular posts from this blog

What are the challenges Zara face to maintain it's growth?

Notably, Zara has a unique approach to handle changing demand, which has allowed the company to become widely successful and a leading business organization in the fashion retail industry, in which many corporations struggle to deal with fast-changing environments, operations, and inventory costs. The arrival of new trends forces retailers to adapt their collections, causing what James (2011) calls the Forrester or bullwhip effect. Zara relies heavily on outsourced manufacturing, even though most operations and inventory decisions and strategies are still held, taken, and based out on their headquarters in Spain. Every time an order is placed, all items are shipped to Spain for final design adjustments and inventory stocking. With the use of technology and collaboration with its store managers, the company can produce only what is currently trending, which results in a significant reduction of unsold items caused by the rapidly changing tastes of consumers in this fast-changing ind

How Toyota New Global Architecture (TNGA) revolutionize the automobile manufacturing industry?

Toyota New Global Architecture (TNGA) system was created to revolutionize the actual automobile manufacturing systems. TNGA aims to promote a massive transformation in Toyota's development processes by emphasizing in harmony between planning and design, which, when appropriately combined and managed, will increase the company’s efficiency (N.A., 2015). Toyota's TNGA system is revolutionary because it creates an even leaner way of designing and manufacturing its cars and establishes a new era of vehicle design and production. From a different perspective, TNGA is a revolutionary system not because it employs a modular approach; since companies like Nissan and Volkswagen already use modular systems in their production plants (Schmitt, 2015). It is revolutionary because it is disruptive and expands the traditional and legendary Toyota’s lean methodology to a different level (N.A., 2015). This new global architecture system is disruptive to the old Toyota Production System (T