Tag: security

Questions Related to security

  1. The length of the User's Session

  2. The length of a single HTTP response

  3. The length of a single HTTP request

  4. Until the server is rebooted


Correct Option: C
  1. Integrity

  2. Availability

  3. Confidentiality

  4. All of the Above


Correct Option: D
  1. The attacker intercepts a message or data transfer between the sender and the receiver

  2. The attacker impersonates an authorized user or service in order to gain access to your system

  3. Both 1 & 2

  4. None of the above


Correct Option: A
  1. Virus

  2. Worm

  3. Macro

  4. Rootkit


Correct Option: C

For which of the following can be Software Capability Maturity Model (CMM) be useful?

  1. Making intuitive judgments

  2. Making realistic predictions

  3. Making conservative estimates

  4. Rational planning of software projects


Correct Option: D
  1. Phishing

  2. Key Loggers

  3. HTTPS

  4. All of the above


Correct Option: D
  1. Sufficient to secure the application

  2. Sufficient only when combined with other controls

  3. Sufficient if the passwords are longer than six characters

  4. Sufficient if none of the users have administrative access


Correct Option: B
Explanation:

To solve this question, the user needs to understand the concept of security in database applications and the limitations of username/password access controls.

Option A: Sufficient to secure the application

This option is incorrect because relying solely on username/password access controls is not sufficient to secure a database application. While these controls can provide a basic level of security, they can be easily bypassed by attackers using techniques like brute force attacks or social engineering. Therefore, additional security measures are needed to ensure the safety of the application.

Option B: Sufficient only when combined with other controls

This option is correct. Username/password access controls can be an effective security measure when combined with other controls such as data encryption, firewalls, and intrusion detection systems. By layering multiple security measures, the application becomes more difficult to compromise and provides a higher level of protection against unauthorized access.

Option C: Sufficient if the passwords are longer than six characters

This option is incorrect. While longer passwords are generally more secure than shorter ones, the length of a password alone is not sufficient to secure a database application. Passwords can still be guessed or cracked using other techniques, and therefore additional security measures are needed to provide adequate protection.

Option D: Sufficient if none of the users have administrative access

This option is incorrect. Even if none of the users have administrative access, the application can still be compromised through other means such as SQL injection attacks or phishing scams. Therefore, additional security measures are needed to ensure the safety of the database application.

The Answer is: B

  1. Enable all necessary monitoring systems to track the test.

  2. Obtain all necessary permission to perform the test

  3. Identify system weaknesses

  4. Create a test plan


Correct Option: B
  1. The certificate expiry date

  2. The principle's private key

  3. The principle's private and public key

  4. None of above


Correct Option: A
  1. Computer Viruses

  2. Loss of data

  3. Unauthorized access

  4. All the above


Correct Option: D