Sample questions

Q1. Which one of the following is not a security testing method?

  1. Vulnerability assessment
  2. Penetration testing
  3. Risk mitigation strategy
  4. Gray box testing

Q2. A user is trying to access a web server that requires authentication and authorization. However, the system has given access to the web application without the user entering the password? This type of security issue is known as what?

  1. Accountability error
  2. Vulnerability
  3. Penetration testing
  4. Access control

Q3. Which type of tests, among the following, are a part of the software code review process? (This is a drag-and-drop type of a question. Here, you can draw a line from the list of answers from the left to the empty box to the right.)

Sample questions

Q4. Test coverage analysis provides what?

  1. Metrics needed for the code coverage
  2. Authentication errors
  3. Code review timelines
  4. Interface design

Q5. Which one the following BEST describes a synthetic transaction?

  1. Vulnerability testing
  2. Penetration testing
  3. Concurrency testing
  4. API testing

Q6. When a threat event exploits a vulnerability, it results in which one of the following?

  1. Security measure
  2. Security improvement
  3. Security violation
  4. Security process

Q7. Code review and testing includes all of these except:

  1. Fuzz
  2. Dynamic
  3. Load
  4. Static

Q8. Denial-of-Service (DoS) is a type of test to check the availability of a service under different conditions, such as______.

  1. Logical security failure
  2. Relevancy of controls
  3. Multiple and simultaneous requests
  4. Authentication failure
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.141.4.167