Mock test

Q1. An interface test is done to ascertain:

  1. Pressure, temperature, and environment conditions
  2. Metrics for code coverage
  3. The round-trip time of a request response
  4. Security during interactions between user to interfaces and interface to modules

Q2. Identity management includes:

  1. The enrollment of user identifiers
  2. The provisioning or deprovisioning of user identities to different systems
  3. Whenever there is a change in user information then updating all associated accounts
  4. All of the above

Q3. When an identified vulnerability is not published by the application vendor then it is called:

  1. Zero-day vulnerability
  2. Zero-day exploit
  3. Zero-day logic bomb
  4. Zero-day threat

Q4. Which one of the following is not a password attack?

  1. Dictionary attack
  2. Brute force attack
  3. Code attack
  4. Hybrid attack

Q5. The reverse of a use case test is a:

  1. Vulnerability case test
  2. Penetration case test
  3. Nonuse case test
  4. Misuse case test

Q6. A person, process, or technology component that either seeks access or controls the access is called:

  1. Subject
  2. Object
  3. Data
  4. Control

Q7. Synthetic transactions are generally used for:

  1. Performance monitoring and directly associated with the availability tenet
  2. Performance monitoring and directly associated with the confidentiality tenet
  3. Performance monitoring and directly associated with the integrity tenet
  4. Performance monitoring and directly associated with authentication

Q8. Imitating a trusted entity, thereby making the system trust this imitated entity, is known as:

  1. Scanning
  2. Sniffing
  3. Spoofing
  4. Monitoring

Q9. Identify the true statements pertaining to access control from the following (this is a drag-and-drop type of question. Here, and for similar drag-and-drop questions, you can draw a line from the list of answers from the left to the empty box on the right).

Mock test

Q10. Which one of the following choices in an audit trail that is unlikely to be contained in the access log file pertaining to physical access?

  1. Access attempts
  2. Access results such as success or failure
  3. Locations accessed
  4. Access control list
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
52.14.172.93