Module 4 Practice Quiz

docx

School

Centennial College *

*We aren’t endorsed by this school

Course

221

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

3

Uploaded by ChefSnow21562

Report
Module 4 Practice Quiz Question 1 Which of the following boot security modes provides the highest degree of security? Trusted boot v Measured boot X UEFI native mode Legacy BIOS boot Feedback: Incorrect. In a UEFI native boot process, there is no boot process protection. ® Question 2 XYZ Company is developing an application. After a few months of initial development, they decide to go through quality assurance testing. The tests show poor results. The developers realize that they have to make changes to their application but to do so, they will have to start their development process all over again. What kind of model are they using? v " Waterfall model Agile model SecDevOps SANS Feedback: Correct. The waterfall model is a sequential design process. This means that once a stage is finished, developers cannot go back to revise a previous stage without starting all over again. Question 3 Which of the following is true for KRI? X A KRI exceeding its normal bounds is always an indicator of compromise. v A KRI exceeding its normal bounds is not always an indicator of compromise. A KRI exceeding its normal bounds is never an indicator of compromise. A KRI never exceeds its normal bounds. Feedback: Incorrect. A key risk Indicator is not a full proof mechanism indicating a compromise. Question 4 Which of the following HTTP response headers provides protection against injection attacks? v Content security policy X-Frame-options X Cross-site scripting protection HTTP strict transport security Feedback: Incorrect. Cross-site scripting protection (X-XSS) prohibits a page from loading if it detects a cross-site scripting attack.
® Question 5 . Johann is heading a project team creating a hospital accounting application using an RDBMS. When the application is tested by the company's software testing team, it is noticed that the application shows vulnerabilities when incorrect values are entered. What should Johann implement to ensure that the incorrect input vulnerabilities are removed, and values are verified before the application sends data to the database? v Implement input validation Change the database to NoSQL Normalization of the database Implement a dead code in the application Feedback: Correct. Validating the input for the right values is a process that prevents the application from executing unwanted entries and code. ® Question 6 - Your organization is planning to be a part of the CISCP program as a partner. As an information security expert in your company, you are approached by your CEO, who wants to understand how the speed limit of public information centers like CISCP is handled. How should you explain how this speed limit is handled to him? v CISCP implements AIS, which resolves the speed limit issue of public information centers. CISCP currently implements threat maps to address the issue of public information center speed limits. CISCP implements PPTP, which takes care of the speed limit issue of public information centers. CISCP implements HTTP protocol in communications to address the speed limit issue of public information centers. Feedback: Correct. Implementing automated indicator sharing (AIS) enables the transfer of information through computer-to-computer communication, which is much faster than email communication that involves human intervention. ® Question 7 - Which of the following is a coding technique wherein an application is written so that its functionality is difficult for an outsider to understand? Dead code Proper input validation v ' Obfuscation code Normalization Feedback: Correct. Obfuscation, or camouflaged, code is a process of modifying a code to no longer be useful to a hacker but remain functional. ® Question 8 - Pooja wants to make a list of confinement tools to ensure her operating system is protected from unknown file and application hazards. Which of the following should NOT be used as a confinement tool? Sandboxes v Honeypots Whitelists / Blacklists File quarantines Feedback: Correct. Honeypots are traps that mislead hackers into attempting attacks and hence are not a confinement tool.
® Question 9 Which protocol is used in AIS? v o OTAXI FTP TCP/IP IMAP Feedback: Correct. Trusted automated exchange of intelligence information (TAXII) is a protocol used for exchanging information over HTTP protocol. This is an application-level protocol. ® Question 10 You download a Word file sent to you through email. When you open the file, the file is in a protected view with the option "Enable Editing" visible on top. This happens due to which of the following confinement tools? Sandbox Cookies Application blacklisting v © Quarantine Feedback: Correct. Microsoft Office documents that are received as attachments opened from an internet location or opened from an unsafe location are, by default, quarantined and displayed in a protected view.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help