Tag: technology

Questions Related to technology

What provides a standard for Web application security and summarizes primary Web application security vulnerabilities based on input from security experts?

  1. The British Standards Institute (BSI) 7799

  2. ISO 27002

  3. The Open Web Application Security Project (OWASP) Top Ten Project

  4. TSP-Secure


Correct Option: C

Which one of the following provides the owner with a legally enforceable right to exclude others from practicing a covered invention for a specified period of time?

  1. Copyright

  2. Patent

  3. Warranty

  4. Trade Secret


Correct Option: B

The columns of the access matrix are called:

  1. Access control lists (ACLs)

  2. Capability lists

  3. Triples

  4. Properties


Correct Option: A

What model describes those characteristics of security engineering processes essential to ensure good security engineering?

  1. Systems Security Engineering Capability Maturity Model (SSE-CMM)

  2. Capability Maturity Model Integration (CMMi)

  3. Bell-LaPadula model

  4. Systems Engineering Capability Maturity Model (SE-CMM)


Correct Option: A

Which form of malware is designed to reproduce itself by utilizing system resources?

  1. A worm

  2. A virus

  3. A trojan horse

  4. A multipart virus


Correct Option: A
  1. A worm

  2. A virus

  3. a trojan horse

  4. a multipart virus


Correct Option: B
  1. Detective

  2. Corrective

  3. Preventive

  4. Administrative


Correct Option: C
  1. Brute force

  2. Denial of service

  3. Buffer overflow

  4. ICMP Sting


Correct Option: D
  1. Through cell suppression

  2. By a trusted backend

  3. By a trusted front-end

  4. By views


Correct Option: C
  1. An unsolicited message was sent

  2. A cell phone was cloned

  3. An IM channel introduced a worm

  4. Traffic was analyzed


Correct Option: A