Module 4 Practice Quiz
docx
keyboard_arrow_up
School
Centennial College *
*We aren’t endorsed by this school
Course
221
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
3
Uploaded by ChefSnow21562
Module
4
Practice
Quiz
€
Question
1
Which
of
the
following
boot
security
modes
provides
the
highest
degree
of
security?
Trusted
boot
v
Measured
boot
X
UEFI
native
mode
Legacy
BIOS
boot
Feedback:
Incorrect.
In
a
UEFI
native
boot
process,
there
is
no
boot
process
protection.
®
Question
2
XYZ
Company
is
developing
an
application.
After
a
few
months
of
initial
development,
they
decide
to
go
through
quality
assurance
testing.
The
tests
show
poor
results.
The
developers
realize
that
they
have
to
make
changes
to
their
application
but
to
do
so,
they
will
have
to
start
their
development
process
all
over
again.
What
kind
of
model
are
they
using?
v
"
Waterfall
model
Agile
model
SecDevOps
SANS
Feedback:
Correct.
The
waterfall
model
is
a
sequential
design
process.
This
means
that
once
a
stage
is
finished,
developers
cannot
go
back
to
revise
a
previous
stage
without
starting
all
over
again.
€
Question
3
Which
of
the
following
is
true
for
KRI?
X
A
KRI
exceeding
its
normal
bounds
is
always
an
indicator
of
compromise.
v
A
KRI
exceeding
its
normal
bounds
is
not
always
an
indicator
of
compromise.
A
KRI
exceeding
its
normal
bounds
is
never
an
indicator
of
compromise.
A
KRI
never
exceeds
its
normal
bounds.
Feedback:
Incorrect.
A
key
risk
Indicator
is
not
a
full
proof
mechanism
indicating
a
compromise.
€
Question
4
Which
of
the
following
HTTP
response
headers
provides
protection
against
injection
attacks?
v
Content
security
policy
X-Frame-options
X
Cross-site
scripting
protection
HTTP
strict
transport
security
Feedback:
Incorrect.
Cross-site
scripting
protection
(X-XSS)
prohibits
a
page
from
loading
if
it
detects
a
cross-site
scripting
attack.
®
Question
5
.
Johann
is
heading
a
project
team
creating
a
hospital
accounting
application
using
an
RDBMS.
When
the
application
is
tested
by
the
company's
software
testing
team,
it
is
noticed
that the
application
shows
vulnerabilities
when
incorrect
values
are
entered.
What
should
Johann
implement
to
ensure
that the
incorrect
input
vulnerabilities
are
removed,
and
values
are
verified
before
the
application
sends
data
to
the
database?
v
Implement
input
validation
Change
the
database
to
NoSQL
Normalization
of
the
database
Implement
a
dead
code
in
the
application
Feedback:
Correct.
Validating
the
input
for
the
right
values
is
a
process
that
prevents
the
application
from
executing
unwanted
entries
and
code.
®
Question
6
-
Your
organization
is
planning
to
be
a
part
of
the
CISCP
program
as
a
partner.
As
an
information
security
expert
in
your
company,
you
are
approached
by
your
CEO,
who
wants
to
understand
how
the
speed
limit
of
public
information
centers
like
CISCP
is
handled.
How
should
you explain
how
this
speed
limit
is
handled
to
him?
v
CISCP
implements
AIS,
which
resolves
the
speed
limit
issue
of
public
information
centers.
CISCP
currently
implements
threat
maps
to
address
the
issue
of
public
information
center
speed
limits.
CISCP
implements
PPTP,
which
takes
care
of
the
speed
limit
issue
of
public
information
centers.
CISCP
implements
HTTP
protocol
in
communications
to
address
the
speed
limit
issue
of
public
information
centers.
Feedback:
Correct.
Implementing
automated
indicator
sharing
(AIS)
enables
the
transfer
of
information
through
computer-to-computer
communication,
which
is
much
faster
than
email
communication
that
involves
human
intervention.
®
Question
7
-
Which
of
the
following
is
a
coding
technique wherein
an
application
is
written
so
that
its
functionality
is
difficult
for
an
outsider
to
understand?
Dead
code
Proper
input
validation
v
'
Obfuscation
code
Normalization
Feedback:
Correct.
Obfuscation,
or
camouflaged,
code
is
a
process
of
modifying
a
code
to
no
longer
be
useful
to
a
hacker
but
remain
functional.
®
Question
8
-
Pooja
wants
to
make
a
list
of
confinement
tools
to
ensure
her
operating
system
is
protected
from
unknown
file
and application
hazards.
Which
of
the
following
should
NOT
be
used
as
a
confinement
tool?
Sandboxes
v
Honeypots
Whitelists
/
Blacklists
File
quarantines
Feedback:
Correct.
Honeypots
are
traps
that
mislead
hackers
into
attempting
attacks
and
hence
are
not
a
confinement
tool.
®
Question
9
Which
protocol
is
used
in
AIS?
v
o
OTAXI
FTP
TCP/IP
IMAP
Feedback:
Correct.
Trusted
automated
exchange
of
intelligence
information
(TAXII)
is
a
protocol
used
for
exchanging
information
over
HTTP
protocol. This
is
an
application-level
protocol.
®
Question
10
You
download
a
Word
file
sent
to
you
through
email.
When
you
open
the
file,
the
file
is
in
a
protected
view
with
the
option
"Enable
Editing"
visible
on
top.
This
happens
due
to
which
of
the
following
confinement
tools?
Sandbox
Cookies
Application
blacklisting
v
©
Quarantine
Feedback:
Correct.
Microsoft
Office
documents
that
are
received
as
attachments
opened
from
an
internet
location
or
opened
from
an
unsafe
location
are,
by
default,
quarantined
and
displayed
in
a
protected
view.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help