Sample questions

Q1. Which one of the following is not a mandatory access control?

  1. Rule-based access control
  2. Role-based access control
  3. Lattice based access control
  4. Discretionary access control

Q2. If access to an object is controlled based on parameters such as location, time, and so on, then this type of access control is known as what?

  1. Content-dependent access control
  2. Context-dependent access control
  3. Character-dependent access control
  4. Class-dependent access control

Q3. Which one of the following is also called as a logic bomb?

  1. Spoofing
  2. Trojan horse getting activated on an event
  3. Vulnerability exploitation by an attacker
  4. Virus

Q4. Dictionary attack is a type of?

  1. Denial-of-Service attack
  2. Spoofing
  3. Password guessing attack
  4. Social engineering

Q5. Basic functionality of the malicious code is to_______.

  1. Upgrade the operating system
  2. Execute itself in the client system
  3. Spoof
  4. Denial-of-Service

Q6. CAPTCHA is one of the popular mechanisms used by websites to control input to the access control system is supplied by humans and not machines. This mechanism is called Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA). Which type of machines is this access control system predominantly concerned with?

  1. WebDots
  2. BotNets
  3. WebBots
  4. WebNets

Q7. The Man-in-the-middle attack is an example of_______.

  1. Sniffing
  2. Spoofing
  3. Eavesdropping
  4. Cache poisoning

Q8. Hiding or showing menus in an application depending on the access permissions of a user is known as________.

  1. Context-dependent access control
  2. Content-dependent access control
  3. Mandatory access control
  4. Role based access control
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.218.212.102