Question
1
0
/1
point
Which
authentication
mechanism
is
susceptible
to
a
man-in-the-middle
attack
if
not
implemented
correctly?
One-time
password
Out-of-band
communication
%
‘»
Continuous
authentication
=
Encryption
Question
3
0/
1
point
Which
of
the
following
statements
about
layered
design
in
operating
systems
is
true?
%
(o
Layering
ensures
that
a
security
problem
affects
only
more
sensitive
layers
-
Layering
provides
a
way
to
balance
design
characteristics
and
achieve
encapsulation
Layering
is
not
considered
a
good
design
practice
in
operating
systems
Layering
allows
for
the
complete
removal
of
functionality
from
the
operating
system
Question
4
0/
1
point
How
are
the
functions
of
an
operating
system
organized
in
terms
of
criticality
and
protection?
They
are
scattered
randomly
across
different
layers
%
(o
They
are
organized
in
concentric
circles
ot
They
are
grouped
into
three
categories:
security
kernel,
operating
system
kernel,
and
other
operating
system
functions
They
are
arranged
horizontally
from
most
critical
to
least
critical
Question
5
0/
1
point
What
is
one
security
concern
associated
with
web
browsers?
Browsers
can
only
access
files
in
certain
directories
on
a
user's
computer
=
Browser
software
can
perform
malicious
functions
or
access
malicious
web
pages
%
(o
Browser
add-ons
can
corrupt
the
browser
and
compromise
security
Browsers
have
limited
command
sets
for
rendering
and
displaying
content
Question
6
0/
1
point
Which
type
of
attack
involves
including
executable
code
in
the
interaction
between
a
client
and
a
server,
which
is
then
executed
by
the
client
or
server?
-
Cross-Site
Scripting
Scripting
Injection
Persistent
Cross-Site
Scripting
%
(o
Code
Within
Data