Tag: security

Questions Related to security

  1. Online Web Application Software Product

  2. Open Web Application Security Process

  3. Open Web Application Security Project

  4. None of the above


Correct Option: C
  1. Common Weakness Enumeration

  2. Common Weaknesses and Exposures

  3. Comprehensive Weaknesses and Exposures

  4. Comprehensive Weakness Enumeration


Correct Option: A
  1. The type of users who would be accessing the data

  2. Availability, Integrity and Confidentiality

  3. The threat level the company faces

  4. Access controls protecting the data


Correct Option: B
  1. Another term for identification

  2. Method of validating a credential set

  3. Method of evaluating the access privileges

  4. None of the above


Correct Option: B
  1. A potential danger to information or system

  2. Any type of weakness in the system

  3. None of the above

  4. All of the above


Correct Option: B
  1. Commitment and support from senior management

  2. Appropriate technical and logical security controls

  3. Updates security policies, procedures and guidelines

  4. Security training to all employees


Correct Option: A
  1. A method by which credentials are validated

  2. A method of ensuring that a subject is the entity it claims to be

  3. Its just another term for authentication

  4. Its just another term for authorization


Correct Option: B
  1. Detailed instructions on how to carry out security tasks

  2. Guidelines to achieve security goals

  3. Broad and high level statements from the top management of the organization

  4. None of the above


Correct Option: C
  1. Availability, Integrity, Confidentiality

  2. Usability, Reliability, Accountability

  3. Quality, Accountability, Integrity

  4. None of the above


Correct Option: A