General Security Concepts | Test-3

0%
0

General Security Concepts | Test-3

This section focuses on evaluating foundational security practices and principles across the entire system. Tests include assessing the applicationโ€™s adherence to the CIA triad (Confidentiality, Integrity, and Availability), evaluating security policies, and verifying compliance with industry standards and regulations. It also covers risk management processes, incident response readiness, data classification, and the use of secure development frameworks. Additionally, this section examines overall security awareness and the applicationโ€™s resilience to common threats such as malware, insider threats, and social engineering attacks.

1 / 17

1. When a scanning tool, web application firewall (WAF), or intrusion prevention system (IPS) mistakenly flags a security vulnerability during software testing, this is referred to as a ________. Choose the right term.

The correct answer is False negatives.

A false negative occurs when a security scanner or test fails to detect a vulnerability or defect that actually exists in the program. This is a significant issue because it gives the impression that the system is secure when, in fact, there are undetected problems.

Hereโ€™s a brief overview of the other options:

  1. True negatives: These occur when a scanner correctly identifies that there are no vulnerabilities or defects present.
  2. False positives: These occur when the scanner mistakenly flags something as a vulnerability when it is not.
  3. True positives: These occur when a scanner correctly identifies an actual vulnerability or defect.

 

2 / 17

2. When security scanners and tests are run, _______ occur when problems are missed despite the presence of defects or vulnerabilities in the program being evaluated.

3 / 17

3. A ______ is a genuine attack that sets off an alert. You are alerted by a brute-force alarm. When you investigate the alert, you learn that someone was attempting to use brute-force tactics to hack into one of your systems

4 / 17

4. ______is a social engineering attack in which attackers send emails or text messages that appear to be from a legitimate source in order to trick the recipient into clicking on a malicious link or providing sensitive information

5 / 17

5. _________ refers to the process of conducting thorough assessments and investigations to ensure that appropriate security measures are in place to protect sensitive information and mitigate potential risks. It involves assessing risks, complying with regulations, evaluating third-party security, conducting security audits, preparing for incidents, and promoting employee awareness. By performing this, organizations can identify and address security risks, comply with regulations, and protect sensitive information, thereby maintaining trust and confidence.

6 / 17

6. A polymorphic virus __________.

7 / 17

7. _________makes sure that no party can refute that it transmitted or received a communication using encryption and/or digital signatures, or that it accepted certain material. It also cannot deny the authenticity of its signature on a document.

8 / 17

8. Which of the following software security risks can arise from verbose error messages and unhandled exceptions?

9 / 17

9. In a legally binding contract known as ____________also called a confidentiality agreement, one party agrees to divulge to another party confidential information about its products or business in exchange for the receiving party’s promise not to share the information with anyone else for a predetermined period of time. By clearly defining what information must be kept secret and what information can be disclosed or made public, these contracts are used to safeguard sensitive data and intellectual property (IP).

10 / 17

10. Without availability, even if you have met the other two requirements of the CIA Triad, your business can be safe

11 / 17

11. Which of the following best represents a detective control?

12 / 17

12. What type of security control is deployed when a user account gets locked after certain allowed attempts?

13 / 17

13. The security analyst recognizes the need to embed information inside another digital audio, video, or image signal in order to ensure the confidentiality of copyright information. This is generally known as:

14 / 17

14. Which one of the following does code signing NOT provide:

User Authentication is not related to code signatures/digital signing

15 / 17

15. A ___________ is a network region (a sub-network) that lies between an organization’s internal network and an external network, generally the Internet, in computer security. This contributes to the layered security architecture by providing sub-network segmentation based on security requirements or policy.

16 / 17

16. _______ means that an organization did all that it could have reasonably done to try and prevent security breaches/compromises/disasters, and taken the necessary steps required as countermeasures/controls. The benefit of this can be seen as the difference between the damage with or without these safeguards in place.

17 / 17

17. A starting point that can be customized for an organization for a minimum security standard. Typical security configurations, Use group policies to check and enforce compliance is known as:

Your score is

The average score is 0%

0%


Related challenges :