Strona 3

BSS - ItC (en)

Pytanie 17
What vulnerability occurs when the output of an event depends on ordered or timed outputs?
Access control problems
Weaknesses in security practices
Buffer overflow
Race conditions
Non-validated input
Pytanie 18
What do you call the vulnerabilities discovered by Google security researchers that affect almost all CPUs released since 1995? (Select two correct answers)
Shell shock
Spectre
NotPetva
WannaCry
Meltdown
Pytanie 19
If developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?
Non-validated input
Race conditions
Weaknesses in security practices
Buffer overflow
Access control problems
Pytanie 20
Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?
In-private browsing mode3
VPN service
Password manager
Open authorization
Pytanie 21
Which of the following security implementations use biometrics? (Choose two correct answers)
Credit card
Voice recognition
Fob
Fingerprint
Phone
Pytanie 22
Which of the following firewalls filters traffic based on source and destination IP addresses?
Application layer firewall
Network address translation firewall
Transport layer firewall
Proxy server
Network layer firewall
Pytanie 23
Which of the following firewalls filters web content requests such as URLs and domain names?
Proxy server
Reverse proxy server
Application layer firewall
Network layer firewall
Network address translation firewall
Pytanie 24
A port scan returns a ‘dropped’ response. What does this mean?
Connections to the port will be denied
There was no reply from the host
A service is listening on the port
Przejdź na Memorizer+
W trybie testu zyskasz:
Brak reklam
Quiz powtórkowy - pozwoli Ci opanować pytania, których nie umiesz
Więcej pytań na stronie testu
Wybór pytań do ponownego rozwiązania
Trzy razy bardziej pojemną historię aktywności
Wykup dostęp