Nauka

BSS - ItC (en)

Wyświetlane są wszystkie pytania.
Pytanie 17
What vulnerability occurs when the output of an event depends on ordered or timed outputs?
Buffer overflow
Race conditions
Weaknesses in security practices
Access control problems
Non-validated input
Pytanie 18
What do you call the vulnerabilities discovered by Google security researchers that affect almost all CPUs released since 1995? (Select two correct answers)
WannaCry
Shell shock
Meltdown
NotPetva
Spectre
Pytanie 19
If developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?
Non-validated input
Race conditions
Buffer overflow
Weaknesses in security practices
Access control problems
Pytanie 20
Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?
Open authorization
VPN service
In-private browsing mode3
Password manager
Pytanie 21
Which of the following security implementations use biometrics? (Choose two correct answers)
Fob
Fingerprint
Credit card
Voice recognition
Phone
Pytanie 22
Which of the following firewalls filters traffic based on source and destination IP addresses?
Network address translation firewall
Network layer firewall
Application layer firewall
Transport layer firewall
Proxy server
Pytanie 23
Which of the following firewalls filters web content requests such as URLs and domain names?
Network address translation firewall
Reverse proxy server
Network layer firewall
Application layer firewall
Proxy server
Pytanie 24
A port scan returns a ‘dropped’ response. What does this mean?
Connections to the port will be denied
A service is listening on the port
There was no reply from the host