Sample questions

Q1. Which one of the following is considered the BEST penetration testing method when the organization wants to ascertain the hacking possibilities from external networks to the internal systems?

  1. Black box testing
  2. Blue box testing
  3. Grey box testing
  4. White box testing

Q2. Vulnerabilities in IT systems are considered:

  1. Holes or errors
  2. Software functionality
  3. Hardware functionality
  4. None of the above

Q3. Which of the following step is not a vulnerability assessment and penetration testing process?

  1. Scope
  2. Result analysis
  3. Software development
  4. Reporting

Q4. Common Vulnerabilities and Exposures (CVE) is a:

  1. Dictionary
  2. Database
  3. Software program
  4. Vulnerability

Q5. The National Vulnerability Database (NVD) provides:

  1. Common Software defects
  2. Common Vulnerability Scoring System
  3. Common Vulnerability Sorting System
  4. Common hardware defects

Q6. If you need to address multi-level security requirements, which of the following models will you choose?

  1. Take-Grant Model
  2. Bell-LaPadula Model
  3. Biba Model
  4. Clark-Wilson Model

Q7. A boundary condition error results in:

  1. Buffer overflow
  2. Buffer reset
  3. Segmentation fault
  4. System reset

Q8. Which of the following statement about the Biba model is FALSE?

  1. Data integrity model
  2. No read up
  3. No read down
  4. No write up

Q9. Which of the following are used as evaluation parameters in Information Technology Security Evaluation Criteria (ITSEC)?

Sample questions

Q10. Which one of the following is a true representation of the protection domain in a Trusted Computer System (TCS)?

  1. It is a function to control or prevent direct access by an insecure or lower-level entity to a secure or higher-level entity
  2. It is a function to control or prevent direct access by an insecure or higher-level entity to a secure or higher-level entity
  3. It is a function to control or prevent direct access by an insecure or higher-level entity to a secure or lower-level entity
  4. It is a function to control or prevent direct access by an insecure or lower-level entity to an insecure or higher-level entity
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.219.198.159