CYB 240 - 2-2 Reading Quiz

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Symmetric cryptography involves how many keys? - 1 - 2 - 3 - 4

1

Which of the following is not a recommended minimum requirement for a password policy? - At least three lowercase letters - At least one non-alphanumeric character - At least two numeric characters - At least two uppercase letters

At least three lowercase letters

If you were to test all the length of all input fields, you would be taking one of the steps to stop what type of attack? - Injection flaws - Clickjack - Insecure cookies - Buffer overflow

Buffer overflow

Symmetric cryptography provides which tenet of the CIA triad? - Availability - Confidentiality - Non-repidiation - Integrity

Confidentiality

Which is not a key component of building string security into the software development life cycle (SDLC)? - Security requirements - Business requirements - Cost-benefit analysis - Threat modeling

Cost-benefit analysis

By implementing technology to identify and prevent internet control message protocol (ICMP) flood attacks, you would be trying to prevent which type of attack? - SQL injection attack - Cross-site scripting attack - Denial-of-service attack - Buffer overflow attack

Denial-of-service attack

Creating a framework for secure coding includes involving the security team. When should the team be involved? - After requirements are detailed - After design - After threat modeling - From the beginning

From the beginning

Passwords should be stored as what type of values? - Complex - Hashed - Non-encrypted - Simple

Hashed

What is the best way to implement the Pragma: No Cache Directive? - Implement it in an HTTPS file header - Write it into a cookie - Write a script to make sure it is applied - Insert it in the meta tag in the header of an HTML page

Insert it in the meta tag in the header of an HTML page

What is considered the most common cause for security breaches? - Insufficient training - Insufficient patch management - Insufficient IT systems - Insufficient funding

Insufficient patch management

Developing and deploying service packs and patches to manage security threats is part of which stage of the waterfall SDLC? - System analysis - Designing - Testing - Maintenance

Maintenance

Asymmetric cryptography is also known as - Private key cryptography - Public key cryptography - Cipher key cryptography - Block key cryptography

Public key cryptography

What are you trying to prevent by giving the lowest possible privileges to any party trying to communicate with the database or its server? - Buffer overflow attacks - Distributed Denial of Service (DDoS) attacks - SQL injection attacks - Clickjack attacks

SQL injection attacks

Which term refers to the process of removing data that exists in memory at the end of a session? - Scrubbing memory - Assessing memory - Deleting memory - Sanitizing memory

Scrubbing memory

What stage comes first in the waterfall SDLC? - Designing - Testing - System analysis - Maintenance

System analysis

What is the main advantage of asymmetric key cryptography over symmetric key cryptography? - The need to distribute the key - The amount of research done on it - The block size of the cipher - The elimination of the need to distribute the key

The elimination of the need to distribute the key

In order to ensure output encoding, characters should be set to which character set? - UTF-16 - Unicode - UTF-8 - ASCII

UTF-8

Which of the following is not part of web application security testing? - Real-time testing - Constant testing and retesting - Using control management tools - Reviewing lines of code

Using control management tools

What is the oldest, best-known methodology for SDLC? - Six Sigma - Agile - Scrum - Waterfall

Waterfall


Set pelajaran terkait

Security Assesment & Penetration testing techniques

View Set

Ch. 4 Information Security Policy

View Set

CGF Unit 7 Practice Questions- Gastrointestinal Disorders

View Set

Classroom Assessment Chapter Four

View Set

Chapter 3: Theoretical Perspectives

View Set

Major Rivers of the World - Fact Card

View Set

Chapter 8 Summary Natural Selection

View Set