1. |
Which of the following is not a benefit of Security Program? |
A. | business agility |
B. | cost reduction |
C. | portability |
D. | frees ram |
Answer» D. frees ram |
2. |
PXB stands for _____________ |
A. | public branch exchange |
B. | private branch exchange |
C. | public branch environment |
D. | private branch environment |
Answer» A. public branch exchange |
3. |
which of the following is not a synonym of crypt? |
A. | light |
B. | vault |
C. | chamber |
D. | hidden |
Answer» A. light |
4. |
Which of the following is incorrect about OAuth Authentication? |
A. | it is an open standard for token-based authentication and authorization on internet |
B. | it allows user\s account information to be used by third party sevices without exposing user\s password |
C. | oauth acts as an intermediary on behalf of user |
D. | oauth stands for onion-route authorization |
Answer» D. oauth stands for onion-route authorization |
5. |
IDS and _______ are important tools in a computer security arsenal. |
A. | network-based intrusion detection system |
B. | host-based intrusion detection system |
C. | intrusion prevension system |
D. | security information and event management |
Answer» C. intrusion prevension system |
6. |
____________ is often known as a reversed version of Bell-LaPadula |
A. | biba |
B. | tcsec |
C. | clark-wilson |
D. | security target |
Answer» A. biba |
7. |
Virtual machine can be divided into_______________ |
A. | super vm, system vm |
B. | super vm, cloud computing |
C. | system vm, process vm |
D. | cloud computing, system vm |
Answer» C. system vm, process vm |
8. |
Thick client application is classified into ________ type |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» B. 2 |
We're developing a website for study materials for students.
We would love to hear your answers to some of the questions.